0080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x20a}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000040)=0x7, 0x4) 23:06:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x68000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:22 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xc00, 0x0) 23:06:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x109003, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(r0, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\xearZ\xab\xd9\xb6\xab1\x98\x197p\xeb\xef\x8c\x1f\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x3d9, 0x8, 0x1, 0x2, 0xf9d, 0x0, 0xffffffffffffff3b, {0x0, @in={{0x2, 0x4e21, @remote}}, 0xfff, 0x7fff, 0x391, 0x8, 0x9}}, &(0x7f0000000180)=0xb0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000002c0)={r2, 0x5a, "a4f28ef6417dd97dc961c679c9596d0bd49a671624c4962a5f685ea932b4d609d9cbed36c87ad23f476eca67454448ed5b41561e431abf35d66d02b8c424ac3e48bd36d4377653bea29361fcdff0ec44e91e64bbab5b68593c79"}, &(0x7f00000001c0)=0x62) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:22 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x2d}) 23:06:22 executing program 0: socketpair$unix(0x1, 0x80004000000000e, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x9, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) 23:06:22 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xd00, 0x0) 23:06:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) chroot(&(0x7f0000000040)='./file0\x00') sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:22 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:22 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x1200, 0x0) 23:06:22 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) write$vhci(r1, &(0x7f00000000c0)=@HCI_ACLDATA_PKT={0x2, "7ff72ebe0ae785a74432248c33ecd1143667194e4500463520eef533a71c887822808eefbe34b596319b362f61699398281b1d0bdd21d07a408c425a391a21c0bf87fbbc8cb35e61c43cb396e53ab86c8448cccddd04bc6c"}, 0x59) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64IPOUT\x00', &(0x7f0000000140)='ppp0\x00', 0x5, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:22 executing program 2: socketpair$unix(0x1, 0x85, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x74000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:22 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x2000, 0x0) 23:06:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x48}) 23:06:23 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f00000000c0)={@mcast1}, &(0x7f0000000100)=0x14) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000040)={0x1, 0x1, 0x7, 0x3, 0x0, 0x8, 0x4}) 23:06:23 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x3f00, 0x0) 23:06:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) lookup_dcookie(0x5, &(0x7f0000000040)=""/34, 0x22) 23:06:23 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:23 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x4000, 0x0) 23:06:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vcs\x00', 0x4000, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000440)={0x10001, 0x401, 0x1, 0x80, 0x0, 0x1, 0xc1c, 0x7, 0x4aa, 0x6, 0x1}, 0xb) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) io_setup(0x9, &(0x7f0000000040)=0x0) io_cancel(r4, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7, 0x731, r0, &(0x7f00000000c0)="7a09f410e7c9de6b20d5b36c47ab5d3d2f90f8975a0b0aece5d78a6d195e55b8543b04121fb83aa47f28a2a1329f682dd7a4b10a0be83ffa34b6e668628c57cc52e2410e459f36607debf4fb357a4ecf89d1e7", 0x53, 0x0, 0x0, 0x0, r3}, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r5, 0x0, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x10) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f00000001c0)={'vcan0\x00', {0x2, 0x4e20, @multicast1}}) 23:06:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x97ffffff, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:23 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x4c}) 23:06:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0xfffffffffffffd42, &(0x7f0000000140), 0x8}, 0xfffffffffffffffd) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x404200, 0x0) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f00000000c0)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) ioctl$UI_DEV_CREATE(r1, 0x5501) 23:06:23 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xe0ff, 0x0) 23:06:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xc0000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffdb5, &(0x7f0000000740), 0x1000000000000197, 0x0, 0xfffffffffffffe3c}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000040)=0xffffffffffffff87) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:23 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:23 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x23, 0x80000) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000180)=0x7, &(0x7f00000001c0)=0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockname$ax25(r2, &(0x7f0000000440)={{}, [@rose, @bcast, @netrom, @netrom, @netrom, @default, @bcast, @default]}, &(0x7f0000000040)=0x48) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8388800}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x6c, r3, 0x408, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xa18e}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x2}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x34}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfffffffffffffff8}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4}, 0x40000) 23:06:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf5ffffff, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:23 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xff01, 0x0) 23:06:23 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x68}) 23:06:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000001c0)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000040)={0x0, 0xffff, 0x5, 0x9}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32=r3, @ANYBLOB="74000000be4afc25841c1486dad3c684aa38bb132729d9439935aee9d9b3041295497c3fd4ba3ee25be3c429b310a4bab4f7fe07993af0768efb23c7c22e17fcbc7c62c89ced80454688e51a0c32d59364edc8f068056771292dbb269a4d7422f0c3060800302c01f834a6bd91e8fb3d4a7c87bb9db18a0a"], &(0x7f0000000180)=0x7c) 23:06:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:24 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xff0f, 0x0) 23:06:24 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf8f73f00, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000180)=0xc) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) renameat(r1, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') r2 = fcntl$getown(r1, 0x9) write$FUSE_LK(r1, &(0x7f0000000100)={0x28, 0x0, 0x4, {{0xc03, 0x240000000, 0x2, r2}}}, 0x28) 23:06:24 executing program 0: r0 = socket$inet(0x2, 0x80803, 0x6) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x202000, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f0000000240)=0x4, 0x307) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xe8) ioctl$KVM_GET_EMULATED_CPUID(r2, 0xc008ae09, &(0x7f00000000c0)=""/62) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000400)={'vcan0\x00', r3}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x110) 23:06:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x6c}) 23:06:24 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:24 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xffe0, 0x0) 23:06:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfcfdffff, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:24 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x806, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000340)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x80000, 0x0) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000400)) prctl$PR_SVE_SET_VL(0x32, 0x54be) openat$nullb(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/nullb0\x00', 0x28000, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000000c0)={0x0, 0x0, [], @raw_data=[0xffff, 0x6, 0x5, 0x6, 0xf6, 0x5d61, 0x800, 0x3, 0x10001, 0x2, 0x7f, 0x27, 0x5, 0x3, 0x10001, 0xe4c, 0x0, 0x5, 0xb8bf, 0x8, 0x8, 0x401, 0xffffffffffffff19, 0x101, 0x1, 0x81, 0xffffffff, 0x7fff, 0x8, 0x9, 0x7, 0x5]}) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = openat$cgroup_ro(r1, &(0x7f0000000480)='/grour.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W_\xdc\xf0Z\x82Ov\xc4\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fD\xde\xc8\x1b\xd7\xd0Y(\xd6\fK\xc1\\a*\xf87 )q\xb3\xd2\xf4\x81\xbb\xfcO\vi', 0x2761, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000300)=0xe887, 0x4) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f0000000580)={0xb0, r3, 0x400, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x80, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ea42307}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc0585604, &(0x7f0000000200)={0x1, 0x0, {0x9, 0x0, 0x300b, 0x3, 0xf, 0x2, 0x2, 0x7}}) openat$cgroup_type(r2, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) sendto$inet(r2, &(0x7f0000000180)="521e9769da1716ea1194191a60b13b41b1846db5a2ba28d51351303903da99b4c996b3", 0x23, 0x200000c0, &(0x7f00000001c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) 23:06:24 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x150ff, 0x0) 23:06:24 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x0, 0x40800) r2 = openat$cgroup_ro(r1, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xf5\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/246, 0xf6, 0x0, &(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f00000001c0)=0x80003378) 23:06:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup3(r1, r0, 0x80000) ioctl$IMADDTIMER(r2, 0x80044940, &(0x7f0000000040)=0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f00000000c0)={0x5, {{0x2, 0x4e23, @rand_addr=0x8}}}, 0x88) ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000180)={0x800, 0xc3}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) 23:06:24 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x408, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfdffffff, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:24 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x80000, 0x0) 23:06:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x74}) 23:06:24 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$RTC_PIE_ON(r1, 0x7005) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x1c, r2, 0x100, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004014}, 0x8000) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000380)={0x4, &(0x7f0000000340)=[{}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f00000004c0)={r3, 0x1, &(0x7f00000003c0)=[0x3a], &(0x7f0000000400)=[0x7fffffff], 0x2, 0x9, 0x80, &(0x7f0000000440)=[0x4, 0x3, 0xfffffffffffffeff, 0x10001, 0x6, 0x8000, 0x7, 0x5, 0xffff], &(0x7f0000000480)=[0x9, 0x0, 0x3]}) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f00000000c0)={0x4, &(0x7f0000000040)=[{}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_LOCK(r1, 0x4008642a, &(0x7f0000000100)={r4, 0x9}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000500)=0x80000000) 23:06:24 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x400000, 0x0) 23:06:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffdfc, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cgroup.controllers\x00', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000100)=""/99, &(0x7f0000000040)=0x63) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f00000000c0)=0x1000000000000000) 23:06:24 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:24 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x800000, 0x0) 23:06:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x7a}) 23:06:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000140)={0x8000, 0x0, 0x10001, 0x2}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000180)={r2, 0x100000000}) r3 = dup(r0) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x9) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) bind$alg(r4, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x58) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) 23:06:25 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:25 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x2000000, 0x0) 23:06:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffdfd, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:25 executing program 0: accept4$vsock_stream(0xffffffffffffffff, &(0x7f00000003c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x800) syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x927, 0x2040) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x280000, 0x0) r1 = dup(r0) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000180)={0x2, 0x2}, 0x127) sendmsg(r0, &(0x7f0000000980)={&(0x7f0000000400)=@pppoe={0x18, 0x0, {0x2, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'team_slave_1\x00'}}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000480)="6a21bb7bf2fa7e266949aa92414b2bc336516cb83c950835eb8c44eeb43fd681e417bf87b8f8c4b0ff1307f9ddb0e197e680072544d853225c50abfd169582c53b1271fb761ca45f780eda3438c2c25577b485faa45ef2d788f1a5420a7e58da355252541f5870e4a2f926e530a35dbd56d61842beb7512e6655271927996d6fd29f5be53e385c116526558434f6e802f9c9979dc6cf0d21952bb4f267a0dc1175322f13a5b052d52a8fd59d568e2212acf140f4357c37baafc90e34ac00f26a5ce03620be4fd262bfd0653b3d953d", 0xcf}, {&(0x7f0000000100)="6866ba31fe0034bfed", 0x9}, {&(0x7f0000000580)="ac8323575435914faff99e9ec087336a57d7650f085e27f908f1696fc061b8a2cb39027988723e1edbc893634d734bd2808a105bff2b89ce7715fd1f1ba15850d1bda847592fc8d95f8f3ecb930a926b034e1c9234116a7d1c05db76615134d55d62b2e80a292a4cb37a21001d452aba480a6b2b6af79cb2f76409a52e61c39f9937d5472b60d24b22c00f23359000f4a2fed92ee7663f28446486d53a675550dafb9ebbf2df8bb83f30680ed554d4a347515365fac63ba7583fe5c6f38fdf7449019a1269d7c85cb46853b7eb0bf050eb1ac476122a03747ba88e6aa75df06be3669dc114f2306b", 0xe8}], 0x3, &(0x7f0000000680)=[{0x68, 0x10f, 0xfff, "aa9fa282d07e8258c8a9452fa0ee762ea5412c94645f04c82a720a2c79e5c0884c92cf7f0d6d13d8ab64fff06dd1432cda3500cbdb3bf9cdae2073f8cb093af635a24347f2ced394df643c6f947f057e0adc333a"}, {0x80, 0x84, 0xff, "224b01c3c7f377db6cce4db3dfaf22a506c5e3eef2e7743a2aaa7048bc7cd94bab61b2bc4f0059d6244afc89b32b26a75cf11bd861adb43770adef62d08942ff68f5db810e4d5311eacfd776861598b5a05e04d943778dce171836e8c17ca6e036b7dfdb9c81140bece956"}, {0x60, 0x11d, 0x6, "c0fb2c51a2cac1b51f0d0d35bb343c59f8f9f58a482b206c16cb328274581da1b44fd8004d28393cb503d3a9829ac9c496c0ed80123e0f373ee5068d06b007a92502b64eb1ac3ff9378b3cfdb363"}, {0xb0, 0x113, 0x1, "68fa0ee20a6966cd76ace2adc678a811f0af95e970a6cea08acfd8012af845070503185809112a1d1fbe78fde5c0b009dc67f9c28f010d988a0cf1fffcfd72fbfb6266b3ff0fd7252519efb780cd00cdd45861a7d5f3cd75aa4b35044c8aca3c7b50b24dcc22f7cb87990f2b51312a6831d681c85590c17fac0a17e272c842556abfd9e15da356d32692184aaa201d7b0ab5bad9df03ed75999ba987d00b"}, {0xd0, 0x117, 0x1020, "fd23db430f767d22bfcbebd9a008e180df58587b435f8f88faea2c47044f547c0b5ac7d8dff2dc1ca429db49c6f52e948f8ce9b203d79aeb9491c7649274310520ade54696ce9db5e22b97b24752620e5399b11cb678ab2442bc552148f771d4fddab346f664b640fad44a33136df79ff7e40a805f565bcf15750a386ccfa056d498e78ad5819ab0d2bb6f4dbfacef2c8b02dc9d41c7fd8bb97417c403f2b2874990427a08cf798caa73d61693eb32e45b020099af935b758413406d"}], 0x2c8}, 0x40085) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) clock_nanosleep(0x3, 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0xfffffffffffff456, 0x400) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a00000000023f007a00080005000200000009000300000008ecf3a13340416f20379de1641bc648fa88de39a7802cbb7cade4e4925a6b55681fe3d461cc395a3f531897189f3f2a96e55a3121bf57fee94a3db201e0faf0ceca55b83f1888521554448b1422b23b36e637b4f7fdd870223ca477a3e7"], 0x18) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) 23:06:25 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x4000000, 0x0) 23:06:25 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:25 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x100b}}, 0x20) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), r1, r2}}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) 23:06:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:25 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x6000000, 0x0) 23:06:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x80000) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x88000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x80000001) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x300}) 23:06:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffff97, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:25 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:25 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x7000000, 0x0) 23:06:25 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) r3 = getpid() getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000640)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000000740)=0xe8) r5 = accept$alg(r2, 0x0, 0x0) r6 = syz_open_dev$cec(&(0x7f0000000780)='/dev/cec#\x00', 0x2, 0x2) r7 = fcntl$getown(r0, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@multicast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000900)={0x0, 0x0, 0x0}, &(0x7f0000000940)=0xc) fcntl$getownex(r2, 0x10, &(0x7f0000000980)={0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000009c0)={{{@in6=@initdev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@initdev}}, &(0x7f0000000ac0)=0xe8) getresgid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)=0x0) sendmsg$unix(r2, &(0x7f0000000d40)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000005c0)=[{&(0x7f00000002c0)="8dfa562aad18fc3cf1c3adedcfae2ebb62e2084976bada67c996707a58d260b25d9d05f4db0f330a506dc1f434da129dc66dd5654c6e67853417e287d4ebfa4ac757d5a2e800b3b79456cac90684f65967675f70440ecdee76ae72a1af8be8758e5fc2a4567132d1e8aab38f4048fd8370c971ca49797fd444f616495027b41a6faab5a7e3da49ef34fb8451fe8367af47f7382c293f659d5e5a1969f4c1f89823adec18c0e7f83c89ebdae3f377ea83f941b2aa8c6df2b02e98030143249d0f46767f67408932119dc628970ccaa6f2b31affd55a66eac69bc8ad5dfbd920b60b56ce8077b8", 0xe6}, {&(0x7f0000000140)="1037c425511623a18d358b513dd763cf99ffe8d1ff1e816719c180fc6e39906da72295ba6fb9caf5b84c8755154ad2bdba193eaf4e5b39d34554d18bcb259a40aaf413d02bf8f3cba8472512571ae8c5294cc4e1a974ad464d3de1e9b7c86422d271182e074dcff99614d2c5c444c32d12798995f15d966148e73fc99d8a114d06376d", 0x83}, {&(0x7f00000003c0)="ecc5e3dccdff1d4912c3c4c758b91c92c4789f5e0156322c82abdfe1abda178b468ea1afd654c920dfbed2b0667d9635af02a9068cc5db5b1b16097f5c2549e2408f9581e9f2742eefa13f2bd4b83dabfdf0f1e0a98f97ed51078a6819774e5d0adfe7cd5400281407923776fb527c17659fa3468ad737042c8e995367d1129e24a9bede1710b933ce38fd9de138fb68a90fd372908d52d687f72a0e84fb116d93d6d61443ad0af2a7aef48acf1ceeaad6e40a62a995b4b850f018a75ad45968b30a564a129b91e882d2f6f82004daddcea88a", 0xd3}, {&(0x7f0000000040)="1dc40b12ba2dd63817db89223c806f9f297322ba9595154a5eeddac94fc1c1ebc1003586db004838c3", 0x29}, {&(0x7f00000004c0)="6a915efaa30453a7be808f3fec8e318acad7b7dd33289a7f84b8fb32cbb958314e04aa70beb7609a8e66b697d562539e644398d60880b536899cb7ea73ef9d16621a4b9b93c9d2ca89ab2ee80dbf71a0513ad85a2545169a54cf6c1db5c11bc662bb2a220e6b32481dd3b8412b69ccb5948eb02e4918490217", 0x79}, {&(0x7f0000000540)="ba2c5f5cd8cf6fca3dd46286a8024828caabc2d295d69ffe09f6bcb912e19059227f61eac17efefe80030520fa2c52a89921b40a563e55ccdf1b8f6ed78b9699c2e15ef0e3e0bc0f807a54199d75a334f50f730ad9d6c2cb61f96c9309ba1d721afe7f5cdd154bf3018194a412a2fed6579842a3e3bc7cddd8b9e0cadd2b50", 0x7f}], 0x6, &(0x7f0000000bc0)=[@rights={0x28, 0x1, 0x1, [r2, r0, r2, r2, r1]}, @cred={0x20, 0x1, 0x2, r3, r4, 0xffffffffffffffff}, @rights={0x30, 0x1, 0x1, [r0, r1, r0, r2, r0, r2, r2, r1]}, @rights={0x30, 0x1, 0x1, [r2, r0, r5, r6, r0, r2, r2, r2]}, @rights={0x18, 0x1, 0x1, [r2]}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @rights={0x18, 0x1, 0x1, [r2]}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @rights={0x28, 0x1, 0x1, [r1, r2, r2, r0, r0]}, @rights={0x18, 0x1, 0x1, [r2]}], 0x158, 0x800}, 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) 23:06:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffff5, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:25 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xc000000, 0x0) 23:06:25 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000100)=ANY=[@ANYRES32=0x0, @ANYBLOB="130001000000"], &(0x7f0000000140)=0xa) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000002c0)={r1, @in6={{0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0x1c}, 0x8}}, 0x3, 0x19a, 0x7, 0x8, 0x4}, &(0x7f0000000180)=0x98) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000000c0)={0x127ff, 0x3, 0x110004, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f00000001c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x401) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) mq_getsetattr(r2, &(0x7f0000000380)={0xf96, 0x3ff, 0x2, 0x800, 0x3, 0x1, 0x2, 0x8000}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000003c0)=0x0) sched_getscheduler(r3) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) 23:06:25 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3f00, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x500}) 23:06:25 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xd000000, 0x0) 23:06:25 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x12000000, 0x0) 23:06:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffffd, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:26 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x7800, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)=0x5) syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x4000000, 0x0) 23:06:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x2000, 0x0) 23:06:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x600}) 23:06:26 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x20000000, 0x0) 23:06:26 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x8008, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:26 executing program 2: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:26 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x3f000000, 0x0) 23:06:26 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x8800, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x2200, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x10000, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000380)='/group.sta\x9f\xd4t\x00+J{\t\xab\v\x02T\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x04\xb9\x0f\xf8`\xcd\x1f&+\xaf\xacu\nm\\\xe2Y\xc9a\xea\f\xd94XX>\x9d=R6\xea\x93\xa1\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8\b\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3W+\xda\r\xec\xf5\xbfm\xcb\x90\x17\xd5[\xddo\xc8!\xf0\xf4\xaa\xbfn\xab\xaat\"\xca]PR\x89\xc7\xf8K\xf5V\a\x82\xbbw\\\x03\x00P,3\xfcm\x1e>\xb7\x8d\x93\\\xe0TB\b\xab\x88\xbf\xcf\xd3\xd1\x14\xaf+\xa5x\xe0`\x842 \x11\\\xb1\xfdA\xea`\xb8jhz\xfbR\x7f\x90#\xae\xff(\x14\xf7#t\x175\xed5R}\xab\x8c\x92,\xd9\xeeXC\x92\xec\xcbQ\x04O\x8f \xe6\xd2\x0e\xf5\x8d\x1c\x02\x1e\x1a(dAT\xcf\n\xd2Y\x95)\x88\xd8\x87\x97+\xea\xc5QZQ\x98?\x10\x85X\xd1\xa68\xf4\xc8v3\xb1\xf0\xb5-\x11a\x94\xecM\b\x88\xef\xefs\xba\xe8DJ\xc1C\x15\x98=\xad\xce\xd1\xcdl$\xa1\xd0', 0x2761, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x6, 0x1a5200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) 23:06:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:26 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x8bffffff, 0x0) 23:06:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000140)) rt_sigpending(&(0x7f0000000180), 0x8) socket$nl_crypto(0x10, 0x3, 0x15) 23:06:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x700}) 23:06:26 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xff01, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x8000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) pipe2(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000100)={0x6, 0x8}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff68, &(0x7f0000000740), 0x20}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in=@multicast1, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@empty}}, &(0x7f0000000440)=0xe8) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000480)={@mcast2, @remote, @remote, 0x3, 0x80, 0x3, 0x400, 0x0, 0x100000, r2}) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f00000000c0)=0xf4240) r3 = request_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)='/proc/capi/capi20\x00', 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, r3) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0xac32) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x400, 0x0) 23:06:26 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xe0ffffff, 0x0) 23:06:26 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xff0f, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) ioctl$KIOCSOUND(r1, 0x4b2f, 0x1f) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:26 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xe4ffffff, 0x0) 23:06:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0xf18}) 23:06:26 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x23c22, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf83f0000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0xb2cd, 0x8000) r2 = openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x2761, 0x0) ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000100)={0x9, 0x2726}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000040)={r0, 0x6b9, 0x5, "d3113ffef832a18f005e84a6e39a4fd20c2694f001fed0a439d0938ea967dbe96703ea2e0bb536"}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000140)) 23:06:27 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xfeffffff, 0x0) 23:06:27 executing program 2: socketpair$unix(0x1, 0x20000000007, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fc) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r3, 0x200, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044040}, 0x800) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000300)=ANY=[@ANYBLOB="03007d006ae18b9b608b1e81a119853720cf6da7ee8b8981b4fd772f9306cd119da2376fd4fb2dac406e8d3092362ec7299487b604000000000000009e26d29fe90ccf6fb5a26a1360ca1fca6ec09284bb04d8d379d45836265d15f9b02f2b66729f87638a0bf051239e9b0ff87c6b30fd049c6e89e96c004a43a576b480907c127a85c77a4aea4ea8bd5bd8b22d4ee3b9ac712fd9ad27931a7c48a22c61f85e"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) r4 = semget(0x0, 0x7, 0x1) semtimedop(r4, &(0x7f0000000180)=[{0x3, 0xfffffffffffffffb, 0x1800}, {0x0, 0xff, 0x1000}, {0x2, 0x240000000, 0x800}], 0x3, &(0x7f00000001c0)={0x77359400}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) connect$tipc(r2, &(0x7f00000007c0)=@id={0x1e, 0x3, 0x0, {0x4e21}}, 0x10) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000640)) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) unshare(0x8000400) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x74, &(0x7f0000000000)={r7, 0x0, 0x10}, &(0x7f0000000040)=0x18) getresgid(&(0x7f00000004c0), &(0x7f0000000500)=0x0, &(0x7f0000000540)) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid', 0x3d, r8}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000040)=0x80000001, 0x4) 23:06:27 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:27 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xff010000, 0x0) 23:06:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x1400}) 23:06:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:27 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 413.838487] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:27 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xff0f0000, 0x0) 23:06:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000040)=0x8) sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140), 0xc}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) 23:06:27 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x880000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$rds(r1, &(0x7f0000001840)={&(0x7f00000000c0)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000001740)=[{&(0x7f0000000100)=""/244, 0xf4}, {&(0x7f00000002c0)=""/51, 0x33}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/93, 0x5d}, {&(0x7f0000001380)=""/73, 0x49}, {&(0x7f0000001400)=""/240, 0xf0}, {&(0x7f0000001500)=""/255, 0xff}, {&(0x7f0000001600)=""/191, 0xbf}, {&(0x7f00000016c0)=""/97, 0x61}], 0x9, &(0x7f0000001800), 0x0, 0x40}, 0x20000800) write$cgroup_subtree(r1, &(0x7f0000000040)={[{0x2b, 'io'}, {0x2b, 'cpu'}, {0x2b, 'memory'}, {0x2f, 'rdma'}, {0x2d, 'rdma'}]}, 0x1d) socket$inet_tcp(0x2, 0x1, 0x0) 23:06:27 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x180f}) 23:06:27 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xff500100, 0x0) 23:06:27 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) fstat(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) fchown(r0, r1, r2) r3 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x101000, 0x0) r4 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x7, 0x620800) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000000)) 23:06:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:28 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xffffff7f, 0x0) 23:06:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:28 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x100) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(r1, &(0x7f0000000100)={0x0, 0x20a, &(0x7f0000000040)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:28 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xffffff8b, 0x0) 23:06:28 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x3, 0x4, 0x81, 0x9, 0x0, 0x6, 0x230, 0xb, 0xfffffffffffffffc, 0x4, 0x101, 0x1, 0x2, 0x4, 0x1fb, 0x8, 0x6, 0x3f, 0xffffffffffffff01, 0xffff, 0x7, 0x8, 0x3, 0xfff, 0x6, 0x1, 0x3f, 0x1, 0x80000001, 0x1d8e, 0x7f8, 0x7fffffff, 0x5, 0x3, 0x3, 0x7fff, 0x0, 0x3, 0x0, @perf_config_ext={0x1af, 0x6899}, 0x10000, 0x8, 0x9, 0x7, 0x4, 0x4}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x8) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000180)=0x2) r3 = fcntl$getown(r0, 0x9) write$FUSE_LK(r2, &(0x7f0000000040)={0x28, 0x1a75429533c0bbc2, 0x4, {{0x8000, 0x100000001, 0x3, r3}}}, 0x28) 23:06:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x1f00}) 23:06:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 23:06:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:28 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xffffffe0, 0x0) 23:06:28 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000040)) 23:06:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fb) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f00000000c0)={{0x0, 0x482b811c0b23587b, 0x3, 0x3, 0x4}, 0x5, 0x6, 'id0\x00', 'timer0\x00', 0x0, 0x7fa, 0x43, 0x1, 0x1}) 23:06:28 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xffffffe4, 0x0) 23:06:28 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x2000}) 23:06:28 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xfffffffe, 0x0) 23:06:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:28 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) epoll_create(0x6) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:28 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x10000000000, 0x0) 23:06:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x5, 0x1f, 0x5}}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) 23:06:28 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:29 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x8000000000000, 0x0) 23:06:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x2d00}) 23:06:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f00000000c0)=0xfffffffffffff80f, &(0x7f0000000100)=0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) 23:06:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:29 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = request_key(&(0x7f0000000100)='.dead\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='cpusettrusted$wlan0$:\x00', 0xfffffffffffffffe) r2 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="da098cc1ed832aeb7e5ddd6a0c1b1c4a18b89034d0d8dc3f1b6399b909787cfc9f095efb644b86ecc8246ddc1c11e9882b66a6201af4997acc9ff67922928b2cd3011d7368a5b0aaebfe866cc802fbf150b1e22734690bc57177a018a9a3fad4e5e45ef6e01f178bd9a23e58cd490af3dc1dd4004a4f9e61ad0460ecc7c4c2e7668a25c3c9ec2288cc89fae7272783a92ca6eb8600a4f7e7c232b2937dffb3861ebfd4b8dcdc4086930e147eb7b2176746b90a9c590a", 0xb6, 0xfffffffffffffffb) r3 = request_key(&(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000380)='hugetlb.2MB.usage_in_bytes\x00', 0xfffffffffffffffc) keyctl$dh_compute(0x17, &(0x7f00000003c0)={r1, r2, r3}, &(0x7f0000000400)=""/79, 0x4f, &(0x7f0000000580)={&(0x7f0000000480)={'sha224-avx\x00'}, &(0x7f00000004c0)="497c87cfe0c34432bf0a7e149e7139e0021ab3262d823d507a176ec641f3134ab008c1579ddd6147c103a4f5c35ba9603673569e4b374d37785a28a44289160297903e513de5049d3b794cd7f950ab774a0517c910cadd3ceed9febb76302c09dc35e5476ef7318a17ec03a4b0d814544011450e504723554d807853b35d8752726b6effeabc", 0x86}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0xd95e9e01003ad84e, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f00000000c0)='memory.swap.current\x00', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) ioctl$VT_DISALLOCATE(r5, 0x5608) 23:06:29 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x8040000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:29 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x40000000000000, 0x0) 23:06:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1400000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ustat(0x4, &(0x7f0000000040)) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f00000000c0)={0x5, 0x4, 0x20, 0x4}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:29 executing program 0: prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000100)) socket$isdn_base(0x22, 0x3, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x4, &(0x7f0000ffc000/0x2000)=nil, 0x4) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x3f00}) 23:06:29 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x8800000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:29 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x80000000000000, 0x0) 23:06:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x180f000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:29 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x4, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x4, 0x600202) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000002c0)={0x0, 0x7, "0d328d50d93057"}, &(0x7f0000000300)=0xf) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000340)={r1, 0x2}, 0x8) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x7) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f00000000c0)={{0x2, 0x4e22, @local}, {0x307, @dev={[], 0x15}}, 0x40, {0x2, 0x4e21, @empty}, 'veth1_to_hsr\x00'}) pipe2(&(0x7f0000000040), 0x800) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) 23:06:29 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xc000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x4000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:29 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x200000000000000, 0x0) 23:06:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1f00000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x4000}) 23:06:29 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:29 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x1}) 23:06:29 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x12000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:29 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x400000000000000, 0x0) 23:06:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:29 executing program 2: socketpair$unix(0x1, 0x20000000007, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fc) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r3, 0x200, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044040}, 0x800) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000300)=ANY=[@ANYBLOB="03007d006ae18b9b608b1e81a119853720cf6da7ee8b8981b4fd772f9306cd119da2376fd4fb2dac406e8d3092362ec7299487b604000000000000009e26d29fe90ccf6fb5a26a1360ca1fca6ec09284bb04d8d379d45836265d15f9b02f2b66729f87638a0bf051239e9b0ff87c6b30fd049c6e89e96c004a43a576b480907c127a85c77a4aea4ea8bd5bd8b22d4ee3b9ac712fd9ad27931a7c48a22c61f85e"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) r4 = semget(0x0, 0x7, 0x1) semtimedop(r4, &(0x7f0000000180)=[{0x3, 0xfffffffffffffffb, 0x1800}, {0x0, 0xff, 0x1000}, {0x2, 0x240000000, 0x800}], 0x3, &(0x7f00000001c0)={0x77359400}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) connect$tipc(r2, &(0x7f00000007c0)=@id={0x1e, 0x3, 0x0, {0x4e21}}, 0x10) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000640)) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) unshare(0x8000400) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x74, &(0x7f0000000000)={r7, 0x0, 0x10}, &(0x7f0000000040)=0x18) getresgid(&(0x7f00000004c0), &(0x7f0000000500)=0x0, &(0x7f0000000540)) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid', 0x3d, r8}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000040)=0x80000001, 0x4) 23:06:30 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x223c0200, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:30 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x600000000000000, 0x0) 23:06:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe2(&(0x7f0000000040), 0x84000) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2d00000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x4800}) 23:06:30 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3f000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:30 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x700000000000000, 0x0) 23:06:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3b00000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:30 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x78000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:30 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xc00000000000000, 0x0) 23:06:30 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f00000000c0)) [ 416.920117] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:30 executing program 2: socketpair$unix(0x1, 0x20000000007, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fc) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r3, 0x200, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044040}, 0x800) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000300)=ANY=[@ANYBLOB="03007d006ae18b9b608b1e81a119853720cf6da7ee8b8981b4fd772f9306cd119da2376fd4fb2dac406e8d3092362ec7299487b604000000000000009e26d29fe90ccf6fb5a26a1360ca1fca6ec09284bb04d8d379d45836265d15f9b02f2b66729f87638a0bf051239e9b0ff87c6b30fd049c6e89e96c004a43a576b480907c127a85c77a4aea4ea8bd5bd8b22d4ee3b9ac712fd9ad27931a7c48a22c61f85e"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) r4 = semget(0x0, 0x7, 0x1) semtimedop(r4, &(0x7f0000000180)=[{0x3, 0xfffffffffffffffb, 0x1800}, {0x0, 0xff, 0x1000}, {0x2, 0x240000000, 0x800}], 0x3, &(0x7f00000001c0)={0x77359400}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) connect$tipc(r2, &(0x7f00000007c0)=@id={0x1e, 0x3, 0x0, {0x4e21}}, 0x10) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000640)) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) unshare(0x8000400) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x74, &(0x7f0000000000)={r7, 0x0, 0x10}, &(0x7f0000000040)=0x18) getresgid(&(0x7f00000004c0), &(0x7f0000000500)=0x0, &(0x7f0000000540)) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid', 0x3d, r8}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000040)=0x80000001, 0x4) 23:06:30 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xd00000000000000, 0x0) 23:06:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x4c00}) 23:06:30 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xf4ffffff, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 23:06:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:31 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x1200000000000000, 0x0) 23:06:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$nl_route(0x10, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000002c0)={0x0, 0x1000, "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"}, &(0x7f0000000040)=0x1008) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000000c0)={r2, 0xa5}, &(0x7f0000000100)=0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:31 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xfeffffff, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x6800}) 23:06:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) [ 417.911090] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:31 executing program 2: socketpair$unix(0x1, 0x20000000007, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fc) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r3, 0x200, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044040}, 0x800) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000300)=ANY=[@ANYBLOB="03007d006ae18b9b608b1e81a119853720cf6da7ee8b8981b4fd772f9306cd119da2376fd4fb2dac406e8d3092362ec7299487b604000000000000009e26d29fe90ccf6fb5a26a1360ca1fca6ec09284bb04d8d379d45836265d15f9b02f2b66729f87638a0bf051239e9b0ff87c6b30fd049c6e89e96c004a43a576b480907c127a85c77a4aea4ea8bd5bd8b22d4ee3b9ac712fd9ad27931a7c48a22c61f85e"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) r4 = semget(0x0, 0x7, 0x1) semtimedop(r4, &(0x7f0000000180)=[{0x3, 0xfffffffffffffffb, 0x1800}, {0x0, 0xff, 0x1000}, {0x2, 0x240000000, 0x800}], 0x3, &(0x7f00000001c0)={0x77359400}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) connect$tipc(r2, &(0x7f00000007c0)=@id={0x1e, 0x3, 0x0, {0x4e21}}, 0x10) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000640)) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) unshare(0x8000400) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x74, &(0x7f0000000000)={r7, 0x0, 0x10}, &(0x7f0000000040)=0x18) getresgid(&(0x7f00000004c0), &(0x7f0000000500)=0x0, &(0x7f0000000540)) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid', 0x3d, r8}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000040)=0x80000001, 0x4) 23:06:31 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x2000000000000000, 0x0) 23:06:31 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xff010000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8932, &(0x7f0000000040)={'nr0\x00', @ifru_names='ip6erspan0\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r2) 23:06:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x6c00}) 23:06:31 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x3f00000000000000, 0x0) 23:06:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6000000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:31 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xff0f0000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) write$P9_RVERSION(r1, &(0x7f00000000c0)={0x15, 0x65, 0xffff, 0x2, 0x8, '9P2000.u'}, 0x15) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) 23:06:32 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x8bffffff00000000, 0x0) 23:06:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x7400}) [ 418.751439] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:32 executing program 2: socketpair$unix(0x1, 0x20000000007, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fc) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r3, 0x200, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044040}, 0x800) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000300)=ANY=[@ANYBLOB="03007d006ae18b9b608b1e81a119853720cf6da7ee8b8981b4fd772f9306cd119da2376fd4fb2dac406e8d3092362ec7299487b604000000000000009e26d29fe90ccf6fb5a26a1360ca1fca6ec09284bb04d8d379d45836265d15f9b02f2b66729f87638a0bf051239e9b0ff87c6b30fd049c6e89e96c004a43a576b480907c127a85c77a4aea4ea8bd5bd8b22d4ee3b9ac712fd9ad27931a7c48a22c61f85e"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) r4 = semget(0x0, 0x7, 0x1) semtimedop(r4, &(0x7f0000000180)=[{0x3, 0xfffffffffffffffb, 0x1800}, {0x0, 0xff, 0x1000}, {0x2, 0x240000000, 0x800}], 0x3, &(0x7f00000001c0)={0x77359400}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) connect$tipc(r2, &(0x7f00000007c0)=@id={0x1e, 0x3, 0x0, {0x4e21}}, 0x10) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000640)) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) unshare(0x8000400) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x74, &(0x7f0000000000)={r7, 0x0, 0x10}, &(0x7f0000000040)=0x18) getresgid(&(0x7f00000004c0), &(0x7f0000000500)=0x0, &(0x7f0000000540)) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid', 0x3d, r8}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:32 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xffffff7f, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:32 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xe0ffffffffffffff, 0x0) 23:06:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 23:06:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x7a00}) 23:06:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:32 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x9, 0x40000) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) 23:06:32 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xe4ffffff00000000, 0x0) 23:06:32 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xfffffff4, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x1000000}) 23:06:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) [ 419.636875] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:33 executing program 2: socketpair$unix(0x1, 0x20000000007, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fc) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r3, 0x200, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044040}, 0x800) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000300)=ANY=[@ANYBLOB="03007d006ae18b9b608b1e81a119853720cf6da7ee8b8981b4fd772f9306cd119da2376fd4fb2dac406e8d3092362ec7299487b604000000000000009e26d29fe90ccf6fb5a26a1360ca1fca6ec09284bb04d8d379d45836265d15f9b02f2b66729f87638a0bf051239e9b0ff87c6b30fd049c6e89e96c004a43a576b480907c127a85c77a4aea4ea8bd5bd8b22d4ee3b9ac712fd9ad27931a7c48a22c61f85e"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) r4 = semget(0x0, 0x7, 0x1) semtimedop(r4, &(0x7f0000000180)=[{0x3, 0xfffffffffffffffb, 0x1800}, {0x0, 0xff, 0x1000}, {0x2, 0x240000000, 0x800}], 0x3, &(0x7f00000001c0)={0x77359400}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) connect$tipc(r2, &(0x7f00000007c0)=@id={0x1e, 0x3, 0x0, {0x4e21}}, 0x10) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000640)) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) unshare(0x8000400) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x74, &(0x7f0000000000)={r7, 0x0, 0x10}, &(0x7f0000000040)=0x18) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:33 executing program 0: r0 = request_key(&(0x7f0000000c00)='rxrpc_s\x00', &(0x7f0000000c40)={'syz', 0x0}, &(0x7f0000000c80)='cpuset/$\x00', 0xfffffffffffffffa) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000b40)={'syz', 0x2}, &(0x7f0000000b80)="3c296fdff7213387ec320a9c6789d4b78543beac32f0d9232d0ff47709acdb8640eb1b9fc77f2932b495b1bb3f03719e954b4a5d20398e9e7dcab5e78ecba7f750c3faea497222e9b3776fd14084324ac4fc7f0902b536e68b972d2931733aeec875853bd64bfef044e4a5df", 0x6c, r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = request_key(&(0x7f0000000040)='.dead\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000b00)='cpuset/$\x00', 0xffffffffffffffff) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/audio\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) r4 = add_key(&(0x7f00000001c0)='rxrpc\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="6e9cedfc2600ada7d10427ed583dd1bedf7a6f48ee030d2eaf0964c22f8682d3521b069f4ee13a841a7282e98e217b67596b2215bf20d0845e5b93662f113f3242cf760165f80b334d621374b2cd07b7aae9002d91d17d13e2ed9d3261ccf14c96", 0x61, 0xfffffffffffffffa) keyctl$search(0xa, r2, &(0x7f0000000140)='rxrpc_s\x00', &(0x7f0000000180)={'syz', 0x1}, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)="26495c4a8944bcaf514ef3316da8e0b71a4f4709b10836fb30a2224c43a1594bad56b468f84f0e2e620a640983a65b1bc60edae6f84a81b311958b524f3c3a472885fff5a1c3284eea2d4f2852cb70f2007894c3b521d7754f42fd0650e8959a1b65f28a45bf5dbac03776e50b46201bbb7c37da2703e0802b82d731268d7c608d9cc3fe6f1a8342c35078dde64041365eb360af3fcf3ca216c830a5e18dab02dfd4ddf955a61f09e847add17e17642458b902068e0aa59d138c577b36a3d99749e684eec29515"}, {&(0x7f0000000480)="d5d9e315246f598d75478189acfd3d52669e43dd339e15b2b97ba35f0ee2cb99019d498526566c67e65c5fc53f4d86aca7355c54efdf9880d0970fd4f8e4f441a7f57f6dc1a78ab2c843f554d884393636b36adb0c615b9a3ab68c2df666a56d1503bf85b17370f602e1a29509ecfeeea46afab5b7e1cfb897a903867b8cbcd958670304e6ebf5750dcae33121402bb8dc3ed2bcf9c1bc1a7cdd326632729962825282b8286c5beace5a117cf20df0449fc58e186a41820b9172"}, {&(0x7f0000000540)="05e6beacf95d535cbc7ee5624a09909d9099f2e660fc293baafc43b6683feab664eb977d3cbaee568855957f062c6cc8fac51afb6c7068747c1ab615defc0f0d3b28534877510bf2a835150ea6333314edd820f77583982ff8451beee4e46e86d2fdeafa37a36acb8bdce77099f613a8fde5d9c7b0"}, {&(0x7f00000005c0)="56dcee3b397865648d2ec030c1a8de3d7d0113e7290231e9b804c5c5055112d3f0b9cae40b126b563e7d456984167e4fbe2f6251e59f8c5a88372380f7f05db8123f62429888e047"}, {&(0x7f0000000640)="d5a638080e7df017de964878d0bf17390dc4575bcb0d3451c0960fa0e1728e1fea49e7b373131104242ee669616214bcafc6f4dc03d6"}, {&(0x7f0000000680)="c6aa1faa5417554e236cea33314f5cf28abcec9d869b7110fb35979b85427edb040e31de88bee91a382b6c1c3c2290076b89175f05a6e89ecd25508971ed4820c5c68a2689323bff07b2908430f951913de2dd"}, {&(0x7f0000000700)="ff856e05ce6c7f44f8147ec0b776d73d51fedeb5c5cf8eaca5ca2eb420109c9b2d90dcc44e6caa5fb9e1c63f161d904493aa46c80ad2a010dff4c9431e03781a863b6765827587648602a9bf187b8a73da9ea91b76812d7d2f116694bf699391e3e3ac62491d6571e8def445ae6f252139c0ca7d17b3247a26bea25dc72dcd4b986c32fa27e7a7fdc0afed6a405dc500bf2f8c32180356bffc95b5ebe8241ba8c5d35425f314ceae4cbab15bdccf07cf2abf6e4ca54f74ccc5f0f55cb30b"}, {&(0x7f00000007c0)="bf48d823cc03e9e705f51038795a60f3d913ff1c8290fa4f49bf352f710a409a27edf4242dd8579f6e3ad2bc89f968293b20864dbce45cbba23241b89817cdd1018e1f1dd2063b8bc3fc2758e375f76af9e2c2628beb65a7421d0e5e470fca23b1fa07f16fcbd1620d0a186a85fc34186a4bca1bd6c240dfbf0e320810e2aa40ff1baf3d87ec5725bdf1d951592bcc62fd8d73582aab9c722c36dcd30554ab6b4f22414a6fc7486c13f6d51a92667d8b1a86172dd5f94ce181d508ed"}, {&(0x7f0000000880)="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"}], 0x0, 0x0, 0xfffffdfb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) 23:06:33 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:33 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xfeffffff00000000, 0x0) 23:06:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x2000000}) 23:06:33 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xffffffff000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:33 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xff01000000000000, 0x0) 23:06:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x97ffffff00000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) [ 420.553641] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:34 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xff0f000000000000, 0x0) 23:06:34 executing program 2: socketpair$unix(0x1, 0x20000000007, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fc) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r3, 0x200, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044040}, 0x800) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000300)=ANY=[@ANYBLOB="03007d006ae18b9b608b1e81a119853720cf6da7ee8b8981b4fd772f9306cd119da2376fd4fb2dac406e8d3092362ec7299487b604000000000000009e26d29fe90ccf6fb5a26a1360ca1fca6ec09284bb04d8d379d45836265d15f9b02f2b66729f87638a0bf051239e9b0ff87c6b30fd049c6e89e96c004a43a576b480907c127a85c77a4aea4ea8bd5bd8b22d4ee3b9ac712fd9ad27931a7c48a22c61f85e"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) r4 = semget(0x0, 0x7, 0x1) semtimedop(r4, &(0x7f0000000180)=[{0x3, 0xfffffffffffffffb, 0x1800}, {0x0, 0xff, 0x1000}, {0x2, 0x240000000, 0x800}], 0x3, &(0x7f00000001c0)={0x77359400}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) connect$tipc(r2, &(0x7f00000007c0)=@id={0x1e, 0x3, 0x0, {0x4e21}}, 0x10) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000640)) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) unshare(0x8000400) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:34 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x800800000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x3000000}) 23:06:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xc000000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x1f) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x318) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x1) r3 = openat$cgroup_ro(r2, &(0x7f0000000700)='/group.sta\x9f\xd4t\x00+\x04=\x16\xe6\xcf\xffJ4bJ{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) eventfd2(0x20, 0x80000) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r2, 0xc0845657, &(0x7f0000000180)={0x0, @reserved}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) r4 = accept4$nfc_llcp(r3, &(0x7f00000000c0), &(0x7f0000000140)=0x60, 0x800) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000007c0)={{{@in6=@initdev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) write$P9_RSTATu(r4, &(0x7f00000008c0)={0x97, 0x7d, 0x2, {{0x0, 0x6d, 0x4, 0xfd1, {0x0, 0x1, 0x3}, 0x1200000, 0x5, 0x3f, 0xff, 0x4, '%[)-', 0x1, '-', 0x9, '-eth0ppp0', 0x2c, 'posix_acl_accessvboxnet0#securityeth1GPLuser'}, 0x15, '&keyringvboxnet1em0lo', r5, r6, r7}}, 0x97) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) recvmsg$kcm(r2, &(0x7f00000005c0)={&(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000380)=""/189, 0xbd}, {&(0x7f0000000440)=""/154, 0x9a}, {&(0x7f0000000500)=""/47, 0x2f}], 0x3, &(0x7f0000000580)=""/32, 0x20}, 0x2100) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r8, 0x6, 0x15, &(0x7f0000000600), 0x16) 23:06:34 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xff50010000000000, 0x0) 23:06:34 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:34 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xffffff7f00000000, 0x0) 23:06:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf5ffffff00000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x40, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000100)="43cf7f3cb66e445fafa84375a8163bfc535d67480cd54ce42a6c861ed28d3126ef205f712e284f2a0e60119c7480273af4f11c103fe1fa42669c4d08ded71df61156aa05fc483b316d16a488a44e9dabde2dd1e87ea4b6e0e557da7b2b13369f70aa1a0397ec65e99d791ee8af986c4cbf71f0fd0c9f3805a3ba54450bdf6af04d0787788c90c67b9f0048868e34469a032c47bbdd6dd216219e77ebd671888a9eadffcfac42fadca85a6d84b9dd794ca1ca501090883acb2a0bd5d2497fcdbf188a55ae3cbfacd1fbc0d4202357c6b814b14c2cfc7d8e165da2cbf6a8dd1da2a4a0cf1c9f7810820b39624ba0f0", 0xee}], 0x10, &(0x7f00000004c0)={[{@quota_account='quota=account'}, {@barrier='barrier'}, {@statfs_quantum={'statfs_quantum', 0x3d, 0x7}}], [{@mask={'mask', 0x3d, '^MAY_READ'}}, {@fsmagic={'fsmagic', 0x3d, 0x7}}, {@appraise_type='appraise_type=imasig'}, {@dont_hash='dont_hash'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@uid_lt={'uid<', r2}}, {@appraise_type='appraise_type=imasig'}]}) r3 = msgget(0x3, 0x1) msgctl$IPC_INFO(r3, 0x3, &(0x7f00000002c0)=""/230) 23:06:34 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xffffffff00000000, 0x0) 23:06:34 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 421.481469] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 [ 421.680231] gfs2: invalid mount option: mask=^MAY_READ [ 421.687932] gfs2: can't parse mount arguments [ 421.781063] gfs2: not a GFS2 filesystem 23:06:35 executing program 2: socketpair$unix(0x1, 0x20000000007, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fc) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r3, 0x200, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044040}, 0x800) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000300)=ANY=[@ANYBLOB="03007d006ae18b9b608b1e81a119853720cf6da7ee8b8981b4fd772f9306cd119da2376fd4fb2dac406e8d3092362ec7299487b604000000000000009e26d29fe90ccf6fb5a26a1360ca1fca6ec09284bb04d8d379d45836265d15f9b02f2b66729f87638a0bf051239e9b0ff87c6b30fd049c6e89e96c004a43a576b480907c127a85c77a4aea4ea8bd5bd8b22d4ee3b9ac712fd9ad27931a7c48a22c61f85e"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) r4 = semget(0x0, 0x7, 0x1) semtimedop(r4, &(0x7f0000000180)=[{0x3, 0xfffffffffffffffb, 0x1800}, {0x0, 0xff, 0x1000}, {0x2, 0x240000000, 0x800}], 0x3, &(0x7f00000001c0)={0x77359400}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) connect$tipc(r2, &(0x7f00000007c0)=@id={0x1e, 0x3, 0x0, {0x4e21}}, 0x10) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000640)) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) unshare(0x8000400) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x4000000}) 23:06:35 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xffffffffffffffe0, 0x0) 23:06:35 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x88000000000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:35 executing program 0: ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000, 0xffffffffffffff9c}) vmsplice(r0, &(0x7f00000004c0)=[{&(0x7f00000000c0)="1b2d938c4ef7", 0x6}, {&(0x7f0000000100)="bb8f50ec251fc4d07a2f7f125fafcad5f4de9cd8a206aa5faa9dcc70734aac19214ec0d731c568623a9f8e6d24eb0bf2", 0x30}, {&(0x7f0000000140)="84e680345ed2bc9a8891e9dea9fb5bde9dad668a31d93c25924f39ab0af2fc5a02517cf8391fe1e6ad73d7304be1eb6e9ca570179913ae6401bcf2440a0a65bb960b50de4e6dbb922a3a8e315c7c05802b985d197602d78fb5e8e9bfbab3de3bb729f1d5eb87db9f2024f92f5ee4df3e7f", 0x71}, {&(0x7f00000002c0)="0eca414b475bcad28b452cfa7c56041a2bc368cfbdd462e9115b582e94351fbf0c8d16f216dba19564f800f9c3c0f73d934bf6fe2b6a480d837af0b7ced3b693e34f1b6763bf46cee14f5fb1c40261c4fa86af972977a432a11b0a3b583f8c98ba477281cf1e76c00d9f00ee009569956ce6b52bd36fc6f7d6aa41c2c74528247cecdbc4bc91d2bbda427179cf384361dde262da825e40fc4a", 0x99}, {&(0x7f00000001c0)="d72133891336efb2acde3befdbf2378d4cb452ee2f7f77e803c021222aaea9dd3f5a2cf7234d558157578edac73747d40b15c3", 0x33}, {&(0x7f0000000380)="7ffb2472adef51a9426b5f505f96e92dd7abdf31c107beec4281202ce1e3a7ab497193e230a49d2786f55c55a1ddab5d0f", 0x31}, {&(0x7f00000003c0)="23c9dca0debce6d9181553eb438dec12acdb631480f824882bd664aa9027e7472a1026d0072a29540940e26453ce06c828cd92e2871757658bede5716998a2cb3964acfb8a72c207360134d4e43a94e19d1b2bb9e90fcb5b8e4767ea77d179ce2147680bf73c194d4c6bb8ca097d915c715d7a9749cd7be1fcc150afed45586a5ae85f7392f5cd840ebd28a1f8c1e41398ee1e744b571f43d73f23a3a218ef4b4fff6a06393fd0b0274fb6a6c23daa30356caa6a4323b36c7922685efe8947b38af716084a828045058ba1c119", 0xcd}], 0x7, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x4000) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) ioctl$KDDELIO(r2, 0x4b35, 0x0) sendmsg$inet_sctp(r2, &(0x7f0000000740)={&(0x7f0000000540)=@in6={0xa, 0x4e23, 0xffffffffffff7fff, @local, 0x36a}, 0x1c, &(0x7f0000000680)=[{&(0x7f0000000580)="8d3a969a828846d94ddbfc8d44bdda15fe6eabc80e7b6156f0b1280250454ade56b6e5c9cf160374667a431f3dbb617678878d2b5033c2866e8043b9f409b6ef88e281701d3e40493b7675c1118abd9cfb97498b39091d52a144cb751f2b955fb4296157b36565cf76ba0ad0b934a6dbb832a3c03a8b71390c59f8cebd205833f2d5567a910c8d731e8f0d46ad18afa077dd63502a60c98318f10d43095b812be27a3e7e250f5a8008d2c5d33bcc90937df11a7541927f5c49e2972928915c21f1420bab5943b91c02e5091e", 0xcc}], 0x1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x50, 0x4000}, 0x805) 23:06:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf8f73f0000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:35 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x2) 23:06:35 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff0f0000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:35 executing program 0: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f00000002c0)={"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"}) 23:06:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfcfdffff00000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) [ 422.388661] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:35 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x4) 23:06:36 executing program 2: socketpair$unix(0x1, 0x20000000007, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fc) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r3, 0x200, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044040}, 0x800) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000300)=ANY=[@ANYBLOB="03007d006ae18b9b608b1e81a119853720cf6da7ee8b8981b4fd772f9306cd119da2376fd4fb2dac406e8d3092362ec7299487b604000000000000009e26d29fe90ccf6fb5a26a1360ca1fca6ec09284bb04d8d379d45836265d15f9b02f2b66729f87638a0bf051239e9b0ff87c6b30fd049c6e89e96c004a43a576b480907c127a85c77a4aea4ea8bd5bd8b22d4ee3b9ac712fd9ad27931a7c48a22c61f85e"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) r4 = semget(0x0, 0x7, 0x1) semtimedop(r4, &(0x7f0000000180)=[{0x3, 0xfffffffffffffffb, 0x1800}, {0x0, 0xff, 0x1000}, {0x2, 0x240000000, 0x800}], 0x3, &(0x7f00000001c0)={0x77359400}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) connect$tipc(r2, &(0x7f00000007c0)=@id={0x1e, 0x3, 0x0, {0x4e21}}, 0x10) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000640)) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x5000000}) 23:06:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:36 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000580)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r2, 0xab07, 0x7fff) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000480)='/proc/capi/capi20\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4) r4 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x7, 0x40800) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000440)=@req3={0x7, 0x7fff, 0x1, 0x26c, 0x0, 0x0, 0xfffffffeffffffff}, 0x1c) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000140)={0x0, 0xb3, "1659b2f00dc68b4b8a16f2700e0b4d0f534c2634e8a98525bb5d627699136a3b2344c70f5fab9efe1cf3300f905e701e19e6ea3a55a70e2da5970a2b4db778"}, &(0x7f0000000040)=0xc36035b441bae84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000001c0)={0x0, 0x6c1a}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f0000000300)={r6, 0xfff, 0x4000000000000000, 0x8000, 0x2, 0x40, 0xa26c, 0xa2, {r7, @in={{0x2, 0x4e21, @remote}}, 0x6c, 0x9, 0x340, 0x736e, 0xfffffffffffffffa}}, &(0x7f00000003c0)=0xb0) listen(r2, 0xed33) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000005c0)={r2, r0, 0xa, 0x85b1f9056ea91f92}, 0x10) perf_event_open$cgroup(&(0x7f00000000c0)={0x5, 0x70, 0xeda, 0x5, 0x1, 0x9a, 0x0, 0xffffffffffffffe9, 0x8000, 0x2, 0x2, 0x0, 0x1, 0x57f, 0x7f7, 0x3, 0x2, 0x2, 0x8, 0x9, 0x7ff, 0x100000000, 0x0, 0xd298, 0x8001, 0x7ff, 0xffffffff80000000, 0xff, 0x800, 0x80000000, 0xb8b, 0x7f, 0x8, 0xc9f0000000000000, 0x7, 0x8, 0x3, 0x6, 0x0, 0x4, 0x2, @perf_config_ext={0x40, 0x5}, 0x40, 0x1, 0x7, 0x0, 0x100000000, 0x200}, r5, 0xc, 0xffffffffffffff9c, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000004c0)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r4, 0x890c, &(0x7f0000000500)={@rand_addr="cc72ec37d692e773abae94e351a8353b", @dev={0xfe, 0x80, [], 0x14}, @remote, 0x20, 0x9, 0x2, 0x400, 0x3, 0x400000, r8}) 23:06:36 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x6) 23:06:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfdffffff00000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:36 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:36 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x7) [ 423.288789] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x6000000}) 23:06:37 executing program 2: socketpair$unix(0x1, 0x20000000007, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fc) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r3, 0x200, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044040}, 0x800) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000300)=ANY=[@ANYBLOB="03007d006ae18b9b608b1e81a119853720cf6da7ee8b8981b4fd772f9306cd119da2376fd4fb2dac406e8d3092362ec7299487b604000000000000009e26d29fe90ccf6fb5a26a1360ca1fca6ec09284bb04d8d379d45836265d15f9b02f2b66729f87638a0bf051239e9b0ff87c6b30fd049c6e89e96c004a43a576b480907c127a85c77a4aea4ea8bd5bd8b22d4ee3b9ac712fd9ad27931a7c48a22c61f85e"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) r4 = semget(0x0, 0x7, 0x1) semtimedop(r4, &(0x7f0000000180)=[{0x3, 0xfffffffffffffffb, 0x1800}, {0x0, 0xff, 0x1000}, {0x2, 0x240000000, 0x800}], 0x3, &(0x7f00000001c0)={0x77359400}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) connect$tipc(r2, &(0x7f00000007c0)=@id={0x1e, 0x3, 0x0, {0x4e21}}, 0x10) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000640)) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socket$inet6_sctp(0xa, 0x10000000005, 0x84) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:37 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x8) 23:06:37 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x800, 0x7, 0xc81, 0x8}]}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x7000000}) 23:06:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10000a, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:37 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:37 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xc) 23:06:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x13, 0x0) ioctl$SG_GET_COMMAND_Q(r0, 0x2270, &(0x7f00000000c0)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = getpgrp(0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000100)={0x8, 0x0, @value=0x7}) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000140)={0x2, 0x5650, 0x3, 0x7, 0x8, 0xffffffff}) ptrace$setopts(0x4206, r2, 0x8, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) setpriority(0x2, r2, 0x100000001) [ 424.177906] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x10000000}) 23:06:37 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xd) 23:06:37 executing program 2: socketpair$unix(0x1, 0x20000000007, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fc) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r3, 0x200, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044040}, 0x800) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000300)=ANY=[@ANYBLOB="03007d006ae18b9b608b1e81a119853720cf6da7ee8b8981b4fd772f9306cd119da2376fd4fb2dac406e8d3092362ec7299487b604000000000000009e26d29fe90ccf6fb5a26a1360ca1fca6ec09284bb04d8d379d45836265d15f9b02f2b66729f87638a0bf051239e9b0ff87c6b30fd049c6e89e96c004a43a576b480907c127a85c77a4aea4ea8bd5bd8b22d4ee3b9ac712fd9ad27931a7c48a22c61f85e"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) r4 = semget(0x0, 0x7, 0x1) semtimedop(r4, &(0x7f0000000180)=[{0x3, 0xfffffffffffffffb, 0x1800}, {0x0, 0xff, 0x1000}, {0x2, 0x240000000, 0x800}], 0x3, &(0x7f00000001c0)={0x77359400}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) connect$tipc(r2, &(0x7f00000007c0)=@id={0x1e, 0x3, 0x0, {0x4e21}}, 0x10) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000640)) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:37 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x600000000000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x101000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000040)=0x3, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) 23:06:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10000c, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x14000000}) 23:06:38 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x12) 23:06:38 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x700000000000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000000c0)=0x0) sched_getaffinity(r2, 0x8, &(0x7f0000000100)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$RTC_WKALM_RD(r3, 0x80287010, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) 23:06:38 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:38 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xe0) 23:06:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10000d, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) [ 424.742424] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:38 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x804000000000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:38 executing program 2: socketpair$unix(0x1, 0x20000000007, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fc) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r3, 0x200, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044040}, 0x800) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000300)=ANY=[@ANYBLOB="03007d006ae18b9b608b1e81a119853720cf6da7ee8b8981b4fd772f9306cd119da2376fd4fb2dac406e8d3092362ec7299487b604000000000000009e26d29fe90ccf6fb5a26a1360ca1fca6ec09284bb04d8d379d45836265d15f9b02f2b66729f87638a0bf051239e9b0ff87c6b30fd049c6e89e96c004a43a576b480907c127a85c77a4aea4ea8bd5bd8b22d4ee3b9ac712fd9ad27931a7c48a22c61f85e"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) r4 = semget(0x0, 0x7, 0x1) semtimedop(r4, &(0x7f0000000180)=[{0x3, 0xfffffffffffffffb, 0x1800}, {0x0, 0xff, 0x1000}, {0x2, 0x240000000, 0x800}], 0x3, &(0x7f00000001c0)={0x77359400}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) connect$tipc(r2, &(0x7f00000007c0)=@id={0x1e, 0x3, 0x0, {0x4e21}}, 0x10) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000640)) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x84591e45fae3099c, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x10, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$VIDIOC_RESERVED(r2, 0x5601, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) 23:06:38 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x600) 23:06:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x180f0000}) 23:06:38 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:38 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x700) 23:06:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x1000) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f00000000c0)={{0x62, @local, 0x4e22, 0x1, 'wrr\x00', 0x1, 0x1, 0x56}, {@dev={0xac, 0x14, 0x14, 0x1a}, 0x4e22, 0x3, 0x1, 0xffffffff, 0x8000}}, 0x44) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) fremovexattr(r0, &(0x7f0000000140)=@known='user.syz\x00') sendmmsg(r0, &(0x7f0000000340)=[{{&(0x7f00000003c0)=@rc={0x1f, {0x8cfc, 0xac, 0x7, 0x0, 0x1000, 0x100000001}, 0x9}, 0x80, &(0x7f0000001840)=[{&(0x7f0000000440)="25dd0464e683db277ee62376f8ec76acfe5774bb45fc07e555f027ceeee3af3038e42db6eacfa8c0bfd5af8b50f6e49f3b9c4a1867150876691e6893113003986939028796ab13b32ba0834ae6a051d7056d5357980a982184011c9444278fcba51d089d443f7eefc52f30392efe252008fde8f57fd8252eed954b44a688c8de2037f118e7f4b9ffe92a0b9a91efee", 0x8f}, {&(0x7f0000000500)="2424b154ca0d420a53e90826583c3524c736e3f5d055d8a6f6259aaf68f6d261543b9fb8077ab48d3a089adad5297166f00a70d613387293c4c7c495cb1d345fd648fb0948a1b536425b78695fa66496e92059be7b2d7812dfb91f853d2bd90e9a96c8c1841abbbb5f439e8e8ba7", 0x6e}, {&(0x7f0000000580)="b7a1f46e24a5148dcb53a6a0b3b9a56cf8d1bb389df90e3f3dfa4bd9819a6c4a328773760536e2fb416c77cce9b371acb4b47095f4a05eab0fd1723a213b836ba93fa4930a1885908cbe57c24b74b4f390123437d3e0b9b91a7136fabe6c716885291ca077e4ae502384a7dc184b9104d800baa6542e42223d792daf96c3eaec553d376a1518baee597f166055baf3cf7f290242400c", 0x96}, {&(0x7f0000000640)="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", 0xfd}, {&(0x7f0000000740)="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", 0x1000}, {&(0x7f0000001740)="93a51530809f20a552162706e6b2ee0140b44a32b4ca72f01a2d0881361b8c4e2aa852a896a473cc193b84a7b93a759970eea1e588193fcc70d332b70b3ef23271b082fa2165baff0cad7e16219418b628aea54c604f26072f2f051498170ef5774f27fd9f574c1785679b3efc3b9247c72f2c7f5df5bccc07179d65225521db0ddbd8564d4e50252fd3b51d2017fedeb678029d92b4af45c79a6b6cfb287c1afc1572a7c798dc5797863439c5913d2e642fd95b9975bdddaff5fa7a7b3ec5983ff929fe96891dcd92711e669abb0556e5b09b369d2cc26f6368c9658f0b1c72", 0xe0}, {&(0x7f0000000140)}], 0x7, &(0x7f00000018c0)=[{0x58, 0x19e, 0x3, "d29c73be357620e34cecb8a204e0d6b1b52f09ca9632b5c6c916b4ecbb5c506fcbb5ba61de55d6821f7e8b69bda2572c0c669cb5d8e135f735c422fff0540c592050108964528a"}, {0x90, 0x84, 0x2, "96479905e927a839a5cbae4a8c965a3c3270ec120e6f7ef7dbfc07ecdd30f72f9e0748020ccc8abd041c68feba395e2f50ad05870c3e73a02fa75e721b33890a435e94903bd99992d11fe419939beb0d1308c1012cbdb1cfa4f19a7ad9ed397e533f887c0cc9f3508d19d515aefb72c2e6e3e4d7326616161ef6200f3e"}], 0xe8}, 0x6}], 0x1, 0x8800) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r3, 0x300, 0x70bd2c, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000010) 23:06:38 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 425.086808] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:38 executing program 2: socketpair$unix(0x1, 0x20000000007, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fc) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r3, 0x200, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044040}, 0x800) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000300)=ANY=[@ANYBLOB="03007d006ae18b9b608b1e81a119853720cf6da7ee8b8981b4fd772f9306cd119da2376fd4fb2dac406e8d3092362ec7299487b604000000000000009e26d29fe90ccf6fb5a26a1360ca1fca6ec09284bb04d8d379d45836265d15f9b02f2b66729f87638a0bf051239e9b0ff87c6b30fd049c6e89e96c004a43a576b480907c127a85c77a4aea4ea8bd5bd8b22d4ee3b9ac712fd9ad27931a7c48a22c61f85e"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) r4 = semget(0x0, 0x7, 0x1) semtimedop(r4, &(0x7f0000000180)=[{0x3, 0xfffffffffffffffb, 0x1800}, {0x0, 0xff, 0x1000}, {0x2, 0x240000000, 0x800}], 0x3, &(0x7f00000001c0)={0x77359400}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) connect$tipc(r2, &(0x7f00000007c0)=@id={0x1e, 0x3, 0x0, {0x4e21}}, 0x10) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000640)) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:38 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xc00) 23:06:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100014, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:38 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x1200000000000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept(r0, &(0x7f00000000c0)=@ll, &(0x7f0000000040)=0x80) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x3}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000002c0)={r2, @in6={{0xa, 0x4e20, 0x5, @rand_addr="05ebeccf360ca405b2577972cc7fe612", 0xb5e}}, 0x6, 0x8, 0x8000, 0xb7, 0x81}, &(0x7f00000001c0)=0x98) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) 23:06:38 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xd00) [ 425.414340] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x1f000000}) 23:06:39 executing program 2: socketpair$unix(0x1, 0x20000000007, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fc) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r3, 0x200, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044040}, 0x800) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000300)=ANY=[@ANYBLOB="03007d006ae18b9b608b1e81a119853720cf6da7ee8b8981b4fd772f9306cd119da2376fd4fb2dac406e8d3092362ec7299487b604000000000000009e26d29fe90ccf6fb5a26a1360ca1fca6ec09284bb04d8d379d45836265d15f9b02f2b66729f87638a0bf051239e9b0ff87c6b30fd049c6e89e96c004a43a576b480907c127a85c77a4aea4ea8bd5bd8b22d4ee3b9ac712fd9ad27931a7c48a22c61f85e"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) r4 = semget(0x0, 0x7, 0x1) semtimedop(r4, &(0x7f0000000180)=[{0x3, 0xfffffffffffffffb, 0x1800}, {0x0, 0xff, 0x1000}, {0x2, 0x240000000, 0x800}], 0x3, &(0x7f00000001c0)={0x77359400}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) connect$tipc(r2, &(0x7f00000007c0)=@id={0x1e, 0x3, 0x0, {0x4e21}}, 0x10) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000640)) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:39 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x223c020000000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:39 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x1200) 23:06:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100025, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:39 executing program 0: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f00000000c0)=0x10, 0x80800) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x101}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000180)={r1, 0x97bb, 0x30, 0x1, 0x8}, &(0x7f00000001c0)=0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffffffffffeb8, &(0x7f0000000380), 0x10000000000002b5, 0x0, 0xfffffffffffffdac}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)=ANY=[@ANYRES32=r2, @ANYBLOB="3f00000058c679e2b3e941142fadcb100bcb280cda1d33b25d852b42e2f96fc1998d2558eb8afe7a6046e9244a9ad542d449dc14200ec4d932f8bd992ecf0dfa0007c0b8ae5e2267b5833f78548a62032a3db7524bb0b1b382a7b44c6a2872c7c2c9451d7a3a"], &(0x7f0000000280)=0x47) 23:06:39 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x2000) 23:06:39 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x20000000}) 23:06:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) finit_module(r1, &(0x7f00000000c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x3) ioctl$SIOCAX25GETINFOOLD(r1, 0x89e9, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) [ 425.856109] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:39 executing program 2: socketpair$unix(0x1, 0x20000000007, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fc) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r3, 0x200, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044040}, 0x800) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000300)=ANY=[@ANYBLOB="03007d006ae18b9b608b1e81a119853720cf6da7ee8b8981b4fd772f9306cd119da2376fd4fb2dac406e8d3092362ec7299487b604000000000000009e26d29fe90ccf6fb5a26a1360ca1fca6ec09284bb04d8d379d45836265d15f9b02f2b66729f87638a0bf051239e9b0ff87c6b30fd049c6e89e96c004a43a576b480907c127a85c77a4aea4ea8bd5bd8b22d4ee3b9ac712fd9ad27931a7c48a22c61f85e"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) r4 = semget(0x0, 0x7, 0x1) semtimedop(r4, &(0x7f0000000180)=[{0x3, 0xfffffffffffffffb, 0x1800}, {0x0, 0xff, 0x1000}, {0x2, 0x240000000, 0x800}], 0x3, &(0x7f00000001c0)={0x77359400}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) connect$tipc(r2, &(0x7f00000007c0)=@id={0x1e, 0x3, 0x0, {0x4e21}}, 0x10) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000640)) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10002d, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:39 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x3f00) 23:06:39 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x7800000000000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x2d000000}) 23:06:39 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x4000) 23:06:39 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000000c0)="6acabecce3cc6f62a3d380a165603d582d87083ea38d5874c0e273b45e286afe8e1f7c23878a7f990b8021d6fddb45ed6ca333e73ea22ccc8ca5ed5823b9c02fa245de530838416a6e20", 0x4a}, {&(0x7f0000000140)="088987bfff31c3613fc28ca14bdd407ea4e77f76a4f6d6b827e2b1cbbf723d592198f3a5782991acd7260b3f27a09d0d6caa820e94573810d5d8ca5de21947121fed407ce26c1efa711c692274f27a93b480952d7949ab9680", 0x59}, {&(0x7f00000001c0)="adc76771ceb0b65757962ba07e16169f57aed636", 0x14}], 0x3}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self/net/pfkey\x00', 0x8000, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r2, 0x110, 0x3) write$binfmt_script(r0, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'vmnet1:^.vmnet0!^{!proc&[!#.['}, {}, {0x20, 'GPLtrusted'}, {}, {0x20, '\'\'vboxnet0/\\'}, {0x20, ')vmnet1[wlan1$proc'}, {0x20, 'wlan0'}, {0x20, '/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f'}, {}], 0xa, "1c9a9af3c0e91238153cc93a457650eb3f70150bd4ce6ad039f0d562136049d31de454cbfe61d5a5a3ca7d0c1f14f6d079ddb5377cf36879fa25fecaa3a594bd9451dd38bdb8683a53eb789563b4a3f01210131af26b14b42c249f2ea9ace954ecdcefec5aea03cdc12a2fc548130f843f67df65312cc3c4b401e63dcd242c4df84d27fb15668009674ca1acab1f4b2f6c87db38d057703e24e7aeeff8c812aea6af025278fdc49b9b065fc2ad3140eef3cd09cc448ff1f3673f386583fbea969b1969afad70ce0ac7811e4a357eec7895113b2a7b01a9fe2a0bdbd67fdb2ca91f0e1aca2c91c9281eb2f4447b4b"}, 0x1d5) write$P9_RXATTRCREATE(r2, &(0x7f0000000040)={0x7, 0x21, 0x1}, 0x7) 23:06:39 executing program 2: socketpair$unix(0x1, 0x20000000007, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fc) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r3, 0x200, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044040}, 0x800) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000300)=ANY=[@ANYBLOB="03007d006ae18b9b608b1e81a119853720cf6da7ee8b8981b4fd772f9306cd119da2376fd4fb2dac406e8d3092362ec7299487b604000000000000009e26d29fe90ccf6fb5a26a1360ca1fca6ec09284bb04d8d379d45836265d15f9b02f2b66729f87638a0bf051239e9b0ff87c6b30fd049c6e89e96c004a43a576b480907c127a85c77a4aea4ea8bd5bd8b22d4ee3b9ac712fd9ad27931a7c48a22c61f85e"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) r4 = semget(0x0, 0x7, 0x1) semtimedop(r4, &(0x7f0000000180)=[{0x3, 0xfffffffffffffffb, 0x1800}, {0x0, 0xff, 0x1000}, {0x2, 0x240000000, 0x800}], 0x3, &(0x7f00000001c0)={0x77359400}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) connect$tipc(r2, &(0x7f00000007c0)=@id={0x1e, 0x3, 0x0, {0x4e21}}, 0x10) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000640)) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) [ 426.249002] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:39 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xe0ff) 23:06:39 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xf4ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:39 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xff01) 23:06:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r2, 0xc0d05604, &(0x7f0000000080)={0x2, @pix_mp}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) [ 426.546961] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x3f000000}) 23:06:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10002f, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:40 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:40 executing program 2: socketpair$unix(0x1, 0x20000000007, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fc) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r3, 0x200, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044040}, 0x800) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000300)=ANY=[@ANYBLOB="03007d006ae18b9b608b1e81a119853720cf6da7ee8b8981b4fd772f9306cd119da2376fd4fb2dac406e8d3092362ec7299487b604000000000000009e26d29fe90ccf6fb5a26a1360ca1fca6ec09284bb04d8d379d45836265d15f9b02f2b66729f87638a0bf051239e9b0ff87c6b30fd049c6e89e96c004a43a576b480907c127a85c77a4aea4ea8bd5bd8b22d4ee3b9ac712fd9ad27931a7c48a22c61f85e"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) r4 = semget(0x0, 0x7, 0x1) semtimedop(r4, &(0x7f0000000180)=[{0x3, 0xfffffffffffffffb, 0x1800}, {0x0, 0xff, 0x1000}, {0x2, 0x240000000, 0x800}], 0x3, &(0x7f00000001c0)={0x77359400}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) connect$tipc(r2, &(0x7f00000007c0)=@id={0x1e, 0x3, 0x0, {0x4e21}}, 0x10) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000640)) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:40 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xff0f) 23:06:40 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0xc00, 0x0) ioctl$sock_ifreq(r0, 0x8937, &(0x7f0000000100)={'vcan0\x00', @ifru_data=&(0x7f00000000c0)="45f59c64e3c3564ec4255079751e7f10016587864a55991810a6048e0715c8df"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) 23:06:40 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xff01000000000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:40 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xff0f000000000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:40 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xffe0) 23:06:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10003b, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) [ 427.062653] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x800, 0x400) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x80000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400208) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendto(r1, &(0x7f00000002c0)="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", 0x1000, 0x40084, &(0x7f0000000100)=@nfc={0x27, 0x1, 0x0, 0x7}, 0x80) 23:06:40 executing program 2: socketpair$unix(0x1, 0x20000000007, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r2, 0x200, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044040}, 0x800) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000300)=ANY=[@ANYBLOB="03007d006ae18b9b608b1e81a119853720cf6da7ee8b8981b4fd772f9306cd119da2376fd4fb2dac406e8d3092362ec7299487b604000000000000009e26d29fe90ccf6fb5a26a1360ca1fca6ec09284bb04d8d379d45836265d15f9b02f2b66729f87638a0bf051239e9b0ff87c6b30fd049c6e89e96c004a43a576b480907c127a85c77a4aea4ea8bd5bd8b22d4ee3b9ac712fd9ad27931a7c48a22c61f85e"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) r3 = semget(0x0, 0x7, 0x1) semtimedop(r3, &(0x7f0000000180)=[{0x3, 0xfffffffffffffffb, 0x1800}, {0x0, 0xff, 0x1000}, {0x2, 0x240000000, 0x800}], 0x3, &(0x7f00000001c0)={0x77359400}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) connect$tipc(r1, &(0x7f00000007c0)=@id={0x1e, 0x3, 0x0, {0x4e21}}, 0x10) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000640)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x40000000}) 23:06:40 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:40 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x150ff) [ 427.300413] Unknown ioctl 35090 [ 427.331578] Unknown ioctl 35090 23:06:40 executing program 0: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x48000, 0x0) syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0xe8, 0x100) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400201) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x5f, &(0x7f0000000740), 0x1000000000000332}, 0x84) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:40 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x80000) [ 427.497591] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:41 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:41 executing program 2: socketpair$unix(0x1, 0x20000000007, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r2, 0x200, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044040}, 0x800) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000300)=ANY=[@ANYBLOB="03007d006ae18b9b608b1e81a119853720cf6da7ee8b8981b4fd772f9306cd119da2376fd4fb2dac406e8d3092362ec7299487b604000000000000009e26d29fe90ccf6fb5a26a1360ca1fca6ec09284bb04d8d379d45836265d15f9b02f2b66729f87638a0bf051239e9b0ff87c6b30fd049c6e89e96c004a43a576b480907c127a85c77a4aea4ea8bd5bd8b22d4ee3b9ac712fd9ad27931a7c48a22c61f85e"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) r3 = semget(0x0, 0x7, 0x1) semtimedop(r3, &(0x7f0000000180)=[{0x3, 0xfffffffffffffffb, 0x1800}, {0x0, 0xff, 0x1000}, {0x2, 0x240000000, 0x800}], 0x3, &(0x7f00000001c0)={0x77359400}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) connect$tipc(r1, &(0x7f00000007c0)=@id={0x1e, 0x3, 0x0, {0x4e21}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x48000000}) [ 427.674790] EXT4-fs: 4 callbacks suppressed [ 427.674804] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000,commit=0x0000000000000000, 23:06:41 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x400000) 23:06:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x32b000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000100)=[@sack_perm, @mss, @timestamp, @sack_perm, @window={0x3, 0x0, 0x9}, @timestamp, @sack_perm, @timestamp, @sack_perm], 0x9) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000080)={0x0, 0x2, 0x200f, 0x1}) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f00000002c0)={0x40000000, 0x7, "6655e6c53329c09c69c5bfe3d311b28c3b29426fcbfb629376b125d46e1b8e38", 0x9, 0x20, 0xffff, 0xfff, 0x3, 0x2, 0xc000000000000, 0x800, [0x6, 0x10001, 0x3, 0x98d]}) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) 23:06:41 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 427.860334] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 [ 427.884219] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000,commit=0x0000000000000000, 23:06:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x40000, 0x0) 23:06:41 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x800000) 23:06:41 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100076, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:41 executing program 2: socketpair$unix(0x1, 0x20000000007, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r2, 0x200, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044040}, 0x800) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000300)=ANY=[@ANYBLOB="03007d006ae18b9b608b1e81a119853720cf6da7ee8b8981b4fd772f9306cd119da2376fd4fb2dac406e8d3092362ec7299487b604000000000000009e26d29fe90ccf6fb5a26a1360ca1fca6ec09284bb04d8d379d45836265d15f9b02f2b66729f87638a0bf051239e9b0ff87c6b30fd049c6e89e96c004a43a576b480907c127a85c77a4aea4ea8bd5bd8b22d4ee3b9ac712fd9ad27931a7c48a22c61f85e"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) r3 = semget(0x0, 0x7, 0x1) semtimedop(r3, &(0x7f0000000180)=[{0x3, 0xfffffffffffffffb, 0x1800}, {0x0, 0xff, 0x1000}, {0x2, 0x240000000, 0x800}], 0x3, &(0x7f00000001c0)={0x77359400}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:41 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x2000000) 23:06:41 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(r0, r0, 0x80000) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rfkill\x00', 0x200180, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuset.memory_pressure\x00', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa8, r3, 0x0, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x94, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe0f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) 23:06:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x4c000000}) 23:06:41 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x4000000) [ 428.308071] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000,commit=0x0000000000000000, 23:06:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x80) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000000c0)={0x2, [0x0, 0x0]}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000140)={r2, 0x40, 0x1, [0x8]}, &(0x7f0000000180)=0xa) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:41 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x6000000) 23:06:41 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x101020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) [ 428.505956] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x68000000}) 23:06:42 executing program 2: socketpair$unix(0x1, 0x20000000007, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r2, 0x200, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044040}, 0x800) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000300)=ANY=[@ANYBLOB="03007d006ae18b9b608b1e81a119853720cf6da7ee8b8981b4fd772f9306cd119da2376fd4fb2dac406e8d3092362ec7299487b604000000000000009e26d29fe90ccf6fb5a26a1360ca1fca6ec09284bb04d8d379d45836265d15f9b02f2b66729f87638a0bf051239e9b0ff87c6b30fd049c6e89e96c004a43a576b480907c127a85c77a4aea4ea8bd5bd8b22d4ee3b9ac712fd9ad27931a7c48a22c61f85e"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) r3 = semget(0x0, 0x7, 0x1) semtimedop(r3, &(0x7f0000000180)=[{0x3, 0xfffffffffffffffb, 0x1800}, {0x0, 0xff, 0x1000}, {0x2, 0x240000000, 0x800}], 0x3, &(0x7f00000001c0)={0x77359400}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0xc4000, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) 23:06:42 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x7000000) 23:06:42 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:42 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xc000000) 23:06:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.usage_all\x00', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'\nebug_want_extra_isize'}}, {@commit={'commit'}}]}) [ 428.913780] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000040)=0x1, 0x4) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x8, 0x6, 0x5}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:42 executing program 2: socketpair$unix(0x1, 0x20000000007, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r2, 0x200, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044040}, 0x800) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000300)=ANY=[@ANYBLOB="03007d006ae18b9b608b1e81a119853720cf6da7ee8b8981b4fd772f9306cd119da2376fd4fb2dac406e8d3092362ec7299487b604000000000000009e26d29fe90ccf6fb5a26a1360ca1fca6ec09284bb04d8d379d45836265d15f9b02f2b66729f87638a0bf051239e9b0ff87c6b30fd049c6e89e96c004a43a576b480907c127a85c77a4aea4ea8bd5bd8b22d4ee3b9ac712fd9ad27931a7c48a22c61f85e"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) semget(0x0, 0x7, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:42 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xd000000) 23:06:42 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x6c000000}) [ 429.196560] EXT4-fs (sda1): Unrecognized mount option " [ 429.196560] ebug_want_extra_isize=0x0000000000000000" or missing value 23:06:42 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x12000000) 23:06:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) [ 429.329446] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:42 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:42 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x20000000) 23:06:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'%ebug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x74000000}) 23:06:43 executing program 2: socketpair$unix(0x1, 0x20000000007, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r2, 0x200, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044040}, 0x800) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000300)=ANY=[@ANYBLOB="03007d006ae18b9b608b1e81a119853720cf6da7ee8b8981b4fd772f9306cd119da2376fd4fb2dac406e8d3092362ec7299487b604000000000000009e26d29fe90ccf6fb5a26a1360ca1fca6ec09284bb04d8d379d45836265d15f9b02f2b66729f87638a0bf051239e9b0ff87c6b30fd049c6e89e96c004a43a576b480907c127a85c77a4aea4ea8bd5bd8b22d4ee3b9ac712fd9ad27931a7c48a22c61f85e"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:43 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 429.701592] EXT4-fs (sda1): Unrecognized mount option "%ebug_want_extra_isize=0x0000000000000000" or missing value 23:06:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) clock_nanosleep(0x4, 0x0, &(0x7f0000000140), 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) accept4$unix(r0, &(0x7f00000000c0)=@abs, &(0x7f0000000040)=0x6e, 0x80800) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PPPOEIOCSFWD(r2, 0x4008b100, &(0x7f0000000180)={0x18, 0x0, {0x2, @remote, 'veth0_to_bridge\x00'}}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:43 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x3f000000) [ 429.897693] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 [ 429.939041] EXT4-fs (sda1): Unrecognized mount option "%ebug_want_extra_isize=0x0000000000000000" or missing value 23:06:43 executing program 2: socketpair$unix(0x1, 0x20000000007, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r2, 0x200, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044040}, 0x800) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000300)=ANY=[@ANYBLOB="03007d006ae18b9b608b1e81a119853720cf6da7ee8b8981b4fd772f9306cd119da2376fd4fb2dac406e8d3092362ec7299487b604000000000000009e26d29fe90ccf6fb5a26a1360ca1fca6ec09284bb04d8d379d45836265d15f9b02f2b66729f87638a0bf051239e9b0ff87c6b30fd049c6e89e96c004a43a576b480907c127a85c77a4aea4ea8bd5bd8b22d4ee3b9ac712fd9ad27931a7c48a22c61f85e"]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:43 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:43 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x8bffffff) 23:06:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'vebug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x7a000000}) 23:06:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000140)={0x8001, 0x5, 0x0, 0x9, "3fd2f229ae32b7c32aeff34dc679f66298a36751feeb702a0cacccdae8454ea5"}) syz_init_net_socket$x25(0x9, 0x5, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x8000, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$IMGETDEVINFO(r2, 0x80044944, &(0x7f00000000c0)={0x5}) 23:06:43 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 430.252426] EXT4-fs (sda1): Unrecognized mount option "vebug_want_extra_isize=0x0000000000000000" or missing value [ 430.408471] EXT4-fs (sda1): Unrecognized mount option "vebug_want_extra_isize=0x0000000000000000" or missing value [ 430.435329] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:43 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xe0ffffff) [ 430.459872] Unknown ioctl -2147202748 23:06:43 executing program 2: socketpair$unix(0x1, 0x20000000007, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r2, 0x200, 0x70bd2c, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044040}, 0x800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:43 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'d\nbug_want_extra_isize'}}, {@commit={'commit'}}]}) [ 430.574138] Unknown ioctl -2147202748 23:06:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) syz_open_procfs$namespace(r2, &(0x7f00000000c0)='ns/mnt\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpu.stat\x00', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) 23:06:44 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xe4ffffff) 23:06:44 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x408, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 430.782586] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x8cffffff}) 23:06:44 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xfeffffff) 23:06:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) clock_gettime(0x0, &(0x7f0000004900)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000004640)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f00000023c0)=[{&(0x7f00000002c0)=""/226, 0xe2}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f0000000140)=""/175, 0xaf}, {&(0x7f0000000040)}], 0x5, &(0x7f0000002440)=""/128, 0x80}, 0x6}, {{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000024c0)=""/145, 0x91}], 0x1, &(0x7f00000025c0)=""/164, 0xa4}, 0xe98}, {{&(0x7f0000002680)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000002ac0)=[{&(0x7f0000002700)=""/77, 0x4d}, {&(0x7f0000002780)=""/251, 0xfb}, {&(0x7f0000002880)=""/248, 0xf8}, {&(0x7f0000002980)=""/99, 0x63}, {&(0x7f0000002a00)=""/192, 0xc0}], 0x5, &(0x7f0000002b40)=""/76, 0x4c}, 0x9}, {{0x0, 0x0, &(0x7f0000002ec0)=[{&(0x7f0000002bc0)=""/164, 0xa4}, {&(0x7f0000002c80)=""/199, 0xc7}, {&(0x7f0000002d80)=""/80, 0x50}, {&(0x7f0000002e00)=""/79, 0x4f}, {&(0x7f0000002e80)=""/39, 0x27}], 0x5}, 0x343d000000}, {{&(0x7f0000002f40)=@alg, 0x80, &(0x7f0000004340)=[{&(0x7f0000002fc0)=""/217, 0xd9}, {&(0x7f00000030c0)=""/86, 0x56}, {&(0x7f0000003140)=""/110, 0x6e}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/2, 0x2}, {&(0x7f0000004200)=""/36, 0x24}, {&(0x7f0000004240)=""/22, 0x16}, {&(0x7f0000004280)=""/131, 0x83}], 0x8, &(0x7f00000043c0)=""/108, 0x6c}, 0x9979}, {{0x0, 0x0, &(0x7f0000004500)=[{&(0x7f0000004440)=""/192, 0xc0}], 0x1, &(0x7f0000004540)=""/201, 0xc9}, 0x401}], 0x6, 0x2, &(0x7f0000004800)={r2, r3+10000000}) link(&(0x7f0000004880)='./file0\x00', &(0x7f00000048c0)='./file0\x00') connect$packet(r1, &(0x7f0000004840)={0x11, 0x1f, r4, 0x1, 0x9, 0x6, @remote}, 0x14) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) write$P9_RLOPEN(r1, &(0x7f0000000040)={0x18, 0xd, 0x1, {{0x20, 0x2}, 0x100}}, 0x18) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:44 executing program 2: socketpair$unix(0x1, 0x20000000007, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fc) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:44 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 430.876952] EXT4-fs (sda1): Unrecognized mount option "d [ 430.876952] bug_want_extra_isize=0x0000000000000000" or missing value [ 431.070885] EXT4-fs (sda1): Unrecognized mount option "d [ 431.070885] bug_want_extra_isize=0x0000000000000000" or missing value 23:06:44 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:44 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xff010000) 23:06:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'d%bug_want_extra_isize'}}, {@commit={'commit'}}]}) [ 431.212880] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:44 executing program 2: socketpair$unix(0x1, 0x20000000007, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fc) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:44 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xff0f0000) 23:06:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x97ffffff}) 23:06:44 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:44 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xff500100) [ 431.563533] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:45 executing program 2: socketpair$unix(0x1, 0x20000000007, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) [ 431.960015] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x6, 0x80) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f00000000c0)={'NETMAP\x00'}, &(0x7f0000000100)=0x1e) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) 23:06:45 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xffffff7f) 23:06:45 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x804, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'dvbug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0xf6ffffff}) 23:06:45 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xffffff8b) 23:06:45 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:45 executing program 2: socketpair$unix(0x1, 0x20000000007, 0x0, &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@version_u='version=9p2000.u'}, {@version_9p2000='version=9p2000'}, {@loose='loose'}, {@version_u='version=9p2000.u'}, {@access_any='access=any'}, {@aname={'aname'}}], [{@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x63, 0x65, 0x76, 0x64, 0x77, 0x77, 0x35, 0x31], 0x2d, [0x36, 0x7f, 0x0, 0x7f], 0x2d, [0x38, 0x39, 0x39], 0x2d, [0x65, 0x66, 0x63, 0x32], 0x2d, [0x62, 0x64, 0x37, 0x61, 0x35, 0x66, 0x63, 0x7e]}}}, {@seclabel='seclabel'}, {@subj_role={'subj_role', 0x3d, '/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f'}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@fsuuid={'fsuuid', 0x3d, {[0x7f, 0x32, 0x31, 0x38, 0x36, 0x77, 0x0, 0x7b], 0x2d, [0x33, 0x0, 0x66, 0x7f], 0x2d, [0x30, 0x39, 0x64, 0x71], 0x2d, [0x75, 0x7c, 0x75, 0x37], 0x2d, [0x61, 0x77, 0x36, 0x61, 0x61, 0x37, 0x35]}}}, {@obj_role={'obj_role', 0x3d, '/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f'}}, {@permit_directio='permit_directio'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'selinuxmime_type'}}]}}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) 23:06:45 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xffffffe0) 23:06:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'de\nug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:45 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0xfcfdffff}) [ 432.418928] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:46 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xffffffe4) 23:06:46 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740), 0x0, 0x0, 0xffffffffffffff24}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) write$FUSE_NOTIFY_DELETE(r1, &(0x7f00000000c0)={0xb2, 0x6, 0x0, {0x4, 0x0, 0x89, 0x0, '/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f'}}, 0xb2) 23:06:46 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:46 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xfffffffe) [ 432.769781] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'de%ug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:46 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:46 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x10000000000) 23:06:46 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7800, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0xfdfdffff}) 23:06:46 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x303c42, 0x0) r1 = mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000000, 0x88010, 0xffffffffffffffff, 0x60) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f00000000c0)={r1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) r4 = syz_open_dev$media(&(0x7f0000000640)='/dev/media#\x00', 0xd2a, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@dev, @in=@empty}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000780)=0xe8) [ 433.076376] EXT4-fs: 6 callbacks suppressed [ 433.076390] EXT4-fs (sda1): Unrecognized mount option "de%ug_want_extra_isize=0x0000000000000000" or missing value [ 433.077737] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:46 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x8000000000000) 23:06:46 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8008, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:46 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:46 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x40000000000000) 23:06:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'devug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0xfdffffff}) 23:06:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x8, 0xfffffffffffffdb5) ptrace$pokeuser(0x6, r2, 0xffffffff, 0x3) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000140)={0x0, {0x2, 0x4e22, @rand_addr=0x2992000000}, {0x2, 0x4e20, @local}, {0x2, 0x4e20, @rand_addr=0x6}, 0x80, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000040)='nlmon0\x00', 0x6b0, 0x100, 0x1}) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f00000002c0)=""/69) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0), 0x113}}, 0x20) 23:06:46 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x80000000000000) [ 433.487437] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:47 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:47 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8800, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 433.571593] EXT4-fs (sda1): Unrecognized mount option "devug_want_extra_isize=0x0000000000000000" or missing value 23:06:47 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x200000000000000) [ 433.717865] EXT4-fs (sda1): Unrecognized mount option "devug_want_extra_isize=0x0000000000000000" or missing value 23:06:47 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff01, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'deb\ng_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000100)=@assoc_value, &(0x7f00000002c0)=0xffffff2a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) [ 433.846219] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0xfffffdfc}) 23:06:47 executing program 2: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:47 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x400000000000000) [ 433.998899] EXT4-fs (sda1): Unrecognized mount option "deb [ 433.998899] g_want_extra_isize=0x0000000000000000" or missing value 23:06:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffc000/0x4000)=nil) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) lsetxattr$trusted_overlay_redirect(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000340)=0xc) setuid(r2) setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2000, 0x0) ioctl$KDDELIO(r3, 0x4b35, 0x200) ioctl$FITRIM(r1, 0xc0185879, &(0x7f00000002c0)={0x80, 0x3, 0x6}) 23:06:47 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:47 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x600000000000000) 23:06:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f00000000c0)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000140)={0x8, {{0xa, 0x4e24, 0x4, @local, 0xfffffffffffffffa}}}, 0x88) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, &(0x7f00000002c0)={0x5, 0x100000000, 0x4}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000100)=0x0) getpgid(r3) [ 434.219039] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 [ 434.238902] EXT4-fs (sda1): Unrecognized mount option "deb [ 434.238902] g_want_extra_isize=0x0000000000000000" or missing value 23:06:47 executing program 2: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:47 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23c22, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:47 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x700000000000000) 23:06:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'deb#g_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0xfffffdfd}) 23:06:47 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xc00000000000000) 23:06:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) acct(&(0x7f00000000c0)='./file0\x00') sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000003c0)="ba031d8d7d16760c3405692fcd6e3ad410d0aad1ca5afdf768dd8c622813265b0e0b3019f941a46c9b25924f0d1576aa9bd5f6c0323af30035eff2408998cf77ec6c7f9d8e5d820ffac62baeda676c114d2308d06d5c0d379f03e310f2d5d22755746ccfa0a5e15843175b35"}], 0x0, 0x0, 0x14d}, 0x4008040) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:48 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 434.579924] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:48 executing program 2: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:48 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xd00000000000000) [ 434.729785] EXT4-fs (sda1): Unrecognized mount option "deb#g_want_extra_isize=0x0000000000000000" or missing value 23:06:48 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 434.793867] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fd) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:48 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x1200000000000000) 23:06:48 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x880000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:48 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) [ 435.019173] EXT4-fs (sda1): Unrecognized mount option "deb#g_want_extra_isize=0x0000000000000000" or missing value 23:06:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'deb%g_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:48 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x2000000000000000) 23:06:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0xffffff8c}) 23:06:48 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 435.217763] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x40000, 0x0) ioctl$KVM_S390_UCAS_MAP(r1, 0x4018ae50, &(0x7f0000000100)={0x7, 0x26, 0xffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x200, 0x0) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x20000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x10) r3 = openat$cgroup_ro(r2, &(0x7f0000000380)='/group.sta\x9f\xd4t\x00+\xfa\xd2E\xef\x03\xce\xa3\x10c.\x8d\xce\x04J{\t\xabI;t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)=0x800000000000000) 23:06:48 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x3f00000000000000) [ 435.385285] EXT4-fs (sda1): Unrecognized mount option "deb%g_want_extra_isize=0x0000000000000000" or missing value 23:06:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0xffffff97}) 23:06:48 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:48 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) geteuid() sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:48 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x8bffffff00000000) [ 435.632489] EXT4-fs (sda1): Unrecognized mount option "deb%g_want_extra_isize=0x0000000000000000" or missing value 23:06:49 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xe0ffffffffffffff) [ 435.749975] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'deb*g_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:49 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:49 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:49 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x9) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000500)) r1 = getpgid(0xffffffffffffffff) sched_rr_get_interval(r1, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)={0xf4, r3, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8bd}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8668}]}, @TIPC_NLA_NODE={0x48, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fc0}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x400000000000000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000001}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1e7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x81}]}, @TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x100}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3f}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20044014}, 0x4000810) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x8, 0xdb, "13980f74ab9c4fb6e60bfb28158399f9e191aee1fea7a9f73848a2ea1774dae13dd4ef022fddf333592da86f8b5b11636c79fe6ac510e37cd0f120b5cdb107b6a81403cdd43832a24ef6db302633337adf082a7c707d2696d546e8f68a1e4e88b0f0fd39f9921510519458e4ae2e84591149760d48573e79c142f4a81c0a9b20c4104c4a6e33c9cdd83b3a9dc640dd4c40db0b7fb481cb6880681645f98d7c728eb1d7958eb18a39d5105472b0ceb0d95dadd6a4e8cf4045433ae154baf2ee680dc19fd67183e22a770cb9b0123fd69df24eb0b0a258d17fd751affca90744a25474c01a3165ad98bfdc3cb27b9aca50172bf1cf5f42d984eeeb4f3fe53e5fa6", 0x41, 0x2, 0x6, 0x3, 0x1000, 0x1, 0x0, 0x1}, r2}}, 0x120) 23:06:49 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xe4ffffff00000000) 23:06:49 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0xfffffff6}) [ 436.056957] EXT4-fs (sda1): Unrecognized mount option "deb*g_want_extra_isize=0x0000000000000000" or missing value [ 436.096326] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000140)={r0, 0xba, 0x10001, "17818029cfaea05edc9ecdfc92e3532aacbf1b34d42783a5e549215308cd8d324919c502b83a2c09fe68ab092015006a9f55be9bd5a516805fe379cd4ff7a6dcc6d6e769021fdc57a612418f27040b89dc60913c78861d511ac455"}) getsockopt$sock_int(r0, 0x1, 0x2b, &(0x7f0000000040), &(0x7f0000000100)=0xfffffffffffffff2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'deb+g_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:49 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xfeffffff00000000) 23:06:49 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:49 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xff01000000000000) 23:06:49 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:49 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x101000) getsockopt$inet_mreq(r0, 0x0, 0x0, &(0x7f0000000100)={@empty, @remote}, &(0x7f0000000140)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x2761, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x19f, &(0x7f0000000740), 0x10000000000001c3}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:49 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0xfffffffd}) 23:06:50 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xff0f000000000000) 23:06:50 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={0x0, 0x3}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140)={r1, 0x401}, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) [ 436.714725] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:50 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'deb-g_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:50 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xff50010000000000) 23:06:50 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r0 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x1, 0x400) write$FUSE_STATFS(r0, &(0x7f00000002c0)={0x60, 0x0, 0x8, {{0x7, 0xbdd, 0xbf, 0x9, 0x800000000000000, 0xe6, 0x2, 0x73f1}}}, 0x60) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x800, 0x0) ioctl$SG_GET_LOW_DMA(r1, 0x227a, &(0x7f00000000c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f0000002700)={0x0, 0x0, &(0x7f00000026c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001c00230000680000000000000000000000039985766abfda48c8e25b99087ec95fe4b9d675559839801ffadca5f3e8df9f50c8ab3715c9ca74bd46683bd8647f1af514c9fc934e85793b14"], 0x14}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) rt_sigsuspend(&(0x7f0000000100)={0x200}, 0x8) clock_settime(0x6, &(0x7f0000000140)={0x0, 0x989680}) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) getpid() setsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000180)=0x8, 0x4) 23:06:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x1000000000}) 23:06:50 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8040000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:50 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xffffff7f00000000) [ 437.145491] Unknown ioctl 8826 [ 437.162234] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 [ 437.254073] Unknown ioctl 35090 23:06:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'deb.g_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:50 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:50 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xffffffff00000000) 23:06:50 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8800000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 437.441462] isofs_fill_super: bread failed, dev=loop2, iso_blknum=143, block=286 23:06:50 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0xffffffffffffffe0) 23:06:51 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x100000000000000}) 23:06:51 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xfffffffffffffffe, 0x200) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000040)=0x1) [ 437.941674] Unknown ioctl 8826 [ 437.945845] Unknown ioctl 35090 23:06:51 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(0x0, &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'deb0g_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:51 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:51 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x600, 0x0) 23:06:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x40000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000002}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x98, r2, 0x0, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0xe44f}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x200}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nr0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x80}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd73, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) 23:06:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x200000000000000}) 23:06:51 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 438.088116] audit: type=1804 audit(1547680011.526:40): pid=25225 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir763288595/syzkaller.806c2K/835/file0" dev="sda1" ino=18086 res=1 23:06:51 executing program 0: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000600)=0x1f) r1 = geteuid() lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffff874, 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)="8ceb1fbec296325340e545a0464dbbf652ad3e4cc1af21e0b07dc43f308d40325466e38fca904cdd482b21", 0x2b, 0xf8}, {&(0x7f0000000180)="be6eb88431bee62f7e61192ad14c2a83f23dbaa7f4a7f9a4ef8964b972147369601432fb05ad259d101023e3cd7f4719db2f463d96628b412b9a8c8a01990238851c55f734bea0a30d7217e7e9ef5be1192c57bead0935de0b27020431254b68c61afbf7f5ef8274ff", 0x69, 0x9bae}, {&(0x7f00000002c0)="f81d9ca56f91330fff89b488a9f1572b223a7bd2d360a572cdcdb02762144fa3ce114ea401fa2080856e8967cea99e3c240a64721b5083d08a1a96a22440395a480db6050f0827b96f327b861dbde44b1b88d5f15e88d643ee88902b4d4b2be62b173c8a750bb4142ca82a195f7966cd11d3eb5198add2c3e1845bd3a98f54fad0382e2d57dfb23dd9ab8c06edba26", 0x8f, 0x254}, {&(0x7f0000000380)="ea55b997d75d0b7cdbe9c804d884eaab95f3664dd7c226bd06dd5ec5ffba51ac9493643dba25e4e44c7565bc4738ac98f30560446a1fa2167c8156f5961fd887123e4da0f19f30a6ce2561499bbe814ccc1c35341e32c9ea73756b76c50143dedf85ea7165bab488e88a6b25ca00f6f03d2e992a1d9da55f1a03dcf8a2e7582502898a3c1fc327bbf429475e950d718ef441d8430f362f7c67e16ce30e429cbb97370e80295b80e8618b0630c1087433db96e6f50a6e1865d314e1ad15113324da895ea2c0a1ae57baed", 0xca, 0x4}], 0x1010, &(0x7f0000000700)={[{@check_strict='check=strict'}, {@unhide='unhide'}, {@utf8='utf8'}, {@check_strict='check=strict'}, {@uid={'uid', 0x3d, r0}}], [{@smackfsroot={'smackfsroot', 0x3d, ','}}, {@euid_gt={'euid>', r1}}, {@appraise='appraise'}, {@euid_lt={'euid<', r2}}, {@dont_appraise='dont_appraise'}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) socket$rds(0x15, 0x5, 0x0) write$P9_RWSTAT(r4, &(0x7f0000000000)={0x7, 0x7f, 0x2}, 0x7) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000740), 0x100000000000024e, 0x0, 0x3}, 0x4) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)=0x10000) [ 438.128855] audit: type=1804 audit(1547680011.556:41): pid=25225 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir763288595/syzkaller.806c2K/835/file0" dev="sda1" ino=18086 res=1 23:06:51 executing program 3: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x480, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@xdp, &(0x7f00000000c0)=0x80, 0x80800) recvmmsg(0xffffffffffffffff, &(0x7f00000021c0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/254, 0xfe}, {&(0x7f00000002c0)=""/129, 0x81}, {&(0x7f0000000380)=""/240, 0xf0}], 0x3, &(0x7f0000000480)=""/129, 0x81}, 0x3ff}, {{&(0x7f0000000540)=@sco, 0x80, &(0x7f0000000140)=[{&(0x7f00000005c0)=""/168, 0xa8}, {&(0x7f0000000680)=""/91, 0x5b}], 0x2, &(0x7f0000000700)=""/232, 0xe8}, 0x9}, {{0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000000800)=""/4096, 0x1000}], 0x1, &(0x7f0000001840)=""/2, 0x2}, 0x401}, {{0x0, 0x0, &(0x7f0000001a80)=[{&(0x7f0000001880)=""/31, 0x1f}, {&(0x7f00000018c0)=""/250, 0xfa}, {&(0x7f00000019c0)=""/182, 0xb6}], 0x3, &(0x7f0000001ac0)=""/15, 0xf}, 0x5}, {{&(0x7f0000001b00)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000001c40)=[{&(0x7f0000001b80)=""/166, 0xa6}], 0x1, &(0x7f0000001c80)=""/31, 0x1f}, 0x1}, {{&(0x7f0000001cc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000020c0)=[{&(0x7f0000001d40)=""/18, 0x12}, {&(0x7f0000001d80)=""/3, 0x3}, {&(0x7f0000001dc0)=""/63, 0x3f}, {&(0x7f0000001e00)=""/152, 0x98}, {&(0x7f0000001ec0)=""/27, 0x1b}, {&(0x7f0000001f00)=""/247, 0xf7}, {&(0x7f0000002000)=""/25, 0x19}, {&(0x7f0000002040)=""/91, 0x5b}], 0x8, &(0x7f0000002140)=""/119, 0x77}, 0x7}], 0x6, 0x0, &(0x7f0000002340)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000002380)={'team0\x00', r2}) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 438.176864] audit: type=1804 audit(1547680011.556:42): pid=25232 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir763288595/syzkaller.806c2K/835/file0" dev="sda1" ino=18086 res=1 [ 438.208048] EXT4-fs: 5 callbacks suppressed [ 438.208060] EXT4-fs (sda1): Unrecognized mount option "deb0g_want_extra_isize=0x0000000000000000" or missing value 23:06:51 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(0x0, &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:51 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x84000, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 23:06:51 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x223c0200, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FIBMAP(r0, 0x1, &(0x7f00000002c0)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0x40, 0xffffffffffffff00}, &(0x7f0000000140)=0x8) write$P9_RUNLINKAT(r2, &(0x7f0000000300)={0x7, 0x4d, 0x1}, 0x7) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000180)={r3, 0xa, "771e4a025d604f44a14b"}, &(0x7f00000001c0)=0x12) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) 23:06:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debXg_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x300000000000000}) 23:06:52 executing program 3: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) read(r0, &(0x7f0000000040)=""/5, 0x5) io_setup(0x1, &(0x7f0000000080)=0x0) io_getevents(r1, 0x4, 0x1, &(0x7f00000000c0)=[{}], 0x0) 23:06:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) statx(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0xfff, &(0x7f00000000c0)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000001c0)) 23:06:52 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 438.757071] EXT4-fs (sda1): Unrecognized mount option "debXg_want_extra_isize=0x0000000000000000" or missing value 23:06:52 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(0x0, &(0x7f00000000c0)='./file0\x00', 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:52 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:52 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', 0x0, 0x0, 0x2) [ 438.952350] EXT4-fs (sda1): Unrecognized mount option "debXg_want_extra_isize=0x0000000000000000" or missing value 23:06:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debcg_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='hugetlb.2MB.usage_in_bytes\x00', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 23:06:52 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4ffffff, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:52 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', 0x0, 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:52 executing program 3: r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0xa43, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) r1 = dup(r0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f00000001c0)=0xc) fcntl$lock(r0, 0x5, &(0x7f0000000200)={0x3, 0x3, 0x40, 0x9, r2}) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000003200200025bd7000ffdb04002ddbd2598407d69b09000000"], 0x1c}, 0x1, 0x0, 0x0, 0x8004}, 0x4008801) fanotify_init(0x4, 0x80001) ioctl$TCGETA(r1, 0x5405, &(0x7f00000000c0)) 23:06:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x400000000000000}) 23:06:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000040)=0x2480284) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) [ 439.283229] EXT4-fs (sda1): Unrecognized mount option "debcg_want_extra_isize=0x0000000000000000" or missing value 23:06:52 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:52 executing program 3: getxattr(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)=@known='trusted.overlay.upper\x00', &(0x7f0000000100)=""/103, 0x67) r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 23:06:53 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', 0x0, 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debdg_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:53 executing program 0: 23:06:53 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x80200, 0x0) 23:06:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x500000000000000}) 23:06:53 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff010000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:53 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', 0x0, 0x1dd7, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) [ 439.858752] EXT4-fs (sda1): Unrecognized mount option "debdg_want_extra_isize=0x0000000000000000" or missing value 23:06:53 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) clone(0x7ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000001200)=0x4, 0x4) sendmmsg(r0, &(0x7f0000007e00), 0x4000000000000f4, 0x0) 23:06:53 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x204000, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r1, 0x40106410, &(0x7f0000000140)={0x55, &(0x7f0000000240)="bd8a2895f6594381e3055fbe2bb8fe09cc0850bff1d892d8fb46df9f3ae5bc60aa36cac2488659ee2fd6c66ecbbdcf531197d826f4a59403db1483443f3dba2e50336f7095bc2fa9f38ef20048a6e1e37afb2dd340"}) 23:06:53 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f0000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debig_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:53 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000480)=[{&(0x7f00000003c0)="18902fd67d76c67998a4cee01d009f4b013df57e08aaac9b468adf367974532dc85873c005880e4aab2fc0585216883974c0b7f23054c95c55a241ceca45b1d7aa052e3ba0650278efb00886e61ccccdce7a8fe67d4da2df28738f5ac7b51ca75467861b993c5296c5797d85877dae5af6aacf411e3ebea8fe5df63960cf0925869db2e9670af73cc25440ea6e82588517210b5e257a37025580b04e408e58399af4128a3281f96d898460964952cc50d323918703ee4f9eba86c99df4e7", 0xbe, 0x1f}, {&(0x7f0000000100)="f3fe2657c4889e59774ddba9758b80ebd5c04ed461f2e8b8e140b6c4e118c7c7ffd7ca6bc41c77468d69c3ce6acca85c8737c96fcdf1ca7422b486ab73218a233d24fc338112af6a015f171566f74ce46d68232d50941a78cfdf070a061cabe11c7041b88c76e80183c0fe873a", 0x6d}], 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:53 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2, &(0x7f0000000180), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpid() getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, r1, 0x0, 0xa, &(0x7f0000000200)='\x1cvboxnet0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x20000000000000af, 0x0, &(0x7f0000000140)='GPL\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x200, 0x3, 0xecce, 0x9d, 0x0, 0x0, 0x20000, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x15, 0x0, 0x0, 0x39ce, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e236edb, 0x0, 0x0, 0xf38, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x1002, 0x101}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) gettid() mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x0) close(r2) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg(0xffffffffffffffff, 0x0, 0x2) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 23:06:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x600000000000000}) 23:06:53 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x8002, 0xfffffffffffffffd) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', 0x0, 0x0, 0x0) socket(0x4, 0x80005, 0x1) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x10841, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x8001, @remote, 0x3}, r2}}, 0x30) 23:06:53 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 440.270862] EXT4-fs (sda1): Unrecognized mount option "debig_want_extra_isize=0x0000000000000000" or missing value [ 440.427559] ISOFS: Unable to identify CD-ROM format. [ 440.437472] EXT4-fs (sda1): Unrecognized mount option "debig_want_extra_isize=0x0000000000000000" or missing value 23:06:53 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff4, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:53 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = geteuid() write$P9_RSTATu(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="940000007d020000006b00ff01f1010000040400000004000000000000000000000402000000ffffffff20000000000000002000776c616e317d2b76626f786e6574307d657468315c297573657273797374656d0000140073656375726974792e6361706162696c69747900080065746830140073656375726974792e6361706562696c69747900", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4], 0x94) 23:06:53 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') mlockall(0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/76, 0x4c}], 0x28f) 23:06:54 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'deblg_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:54 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:54 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x480, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000540), &(0x7f0000000580)=0x4) r2 = geteuid() syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x80, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="82a36848b8b40e140b911ed4d81dfa5a76db6494ef8864bc9471fb7c865dcb47f8f2c2dfc26663f750cddcd87bc7d6ea673116a810ef913a7ded4776218eeb4588dd62e53c365836bcd7fcd761c5a0f0532b56d4db58132b8072e5f436a38c810ab0b9f8a9481edd11b77f88f9b0d7351766a3a8d706399029f9dbed7813af0252e9d3f468a7cf3c52356e63fcfe21f3cd701bcea18406c9762a0872eec8a9e8b6f24c3a9465684216986cf4cc51f91086eb9a0448d77286a2e391d3b2379d071dce367415bae3d84c995914a11bbb588fa432b03b848fb45bb6e139af15", 0xde}], 0x244000, &(0x7f00000002c0)={[{@space_cache='space_cache'}, {@datasum='datasum'}, {@noenospc_debug='noenospc_debug'}, {@usebackuproot='usebackuproot'}, {@compress_force_algo={'compress-force', 0x3d, 'lzo'}}, {@ref_verify='ref_verify'}, {@user_subvol_rm='user_subvol_rm_allowed'}, {@nossd_spread='nossd_spread'}, {@noflushoncommit='noflushoncommit'}, {@skip_balance='skip_balance'}], [{@fowner_gt={'fowner>', r2}}, {@smackfsfloor={'smackfsfloor', 0x3d, '!'}}, {@fsname={'fsname', 0x3d, 'em0'}}, {@smackfshat={'smackfshat', 0x3d, ']/'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x65, 0x39, 0x31, 0x3b, 0x39, 0x77, 0x36], 0x2d, [0x64, 0x64, 0x3b, 0x35], 0x2d, [0x32, 0x77, 0x61, 0x7f], 0x2d, [0x77, 0x77, 0x0, 0x7e], 0x2d, [0x39, 0x37, 0x77, 0x63, 0x77, 0x61, 0x63, 0x39]}}}, {@smackfsroot={'smackfsroot', 0x3d, 'security.capability\x00'}}, {@dont_measure='dont_measure'}, {@obj_type={'obj_type', 0x3d, 'vboxnet0'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@uid_lt={'uid<'}}]}) ioctl$VT_WAITACTIVE(r1, 0x5607) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) 23:06:54 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x700000000000000}) 23:06:54 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800800000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 440.979973] EXT4-fs (sda1): Unrecognized mount option "deblg_want_extra_isize=0x0000000000000000" or missing value [ 440.988744] ISOFS: Unable to identify CD-ROM format. 23:06:54 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:54 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)={[{@sbsector={'sbsector', 0x3d, 0x4f1a}}, {@overriderock='overriderockperm'}, {@nojoliet='nojoliet'}, {@sbsector={'sbsector', 0x3d, 0x7f}}, {@gid={'gid'}}, {@overriderock='overriderockperm'}, {@block={'block', 0x3d, 0x400}}, {@mode={'mode', 0x3d, 0xa39}}]}) 23:06:54 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r2 = epoll_create(0x8) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000100)='.\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r1}}) r4 = fcntl$dupfd(r0, 0x406, r0) setsockopt$llc_int(r4, 0x10c, 0xf, &(0x7f00000001c0)=0x1, 0x1a3) bind$llc(r4, &(0x7f0000000080)={0x1a, 0x339, 0x50d9, 0x3f, 0x9, 0xda, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000040)=0x7fffffff, 0x4) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 23:06:54 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 441.257412] EXT4-fs (sda1): Unrecognized mount option "deblg_want_extra_isize=0x0000000000000000" or missing value 23:06:54 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') mlockall(0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/76, 0x4c}], 0x28f) 23:06:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x1400000000000000}) 23:06:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debog_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:54 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88000000000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 441.661521] ISOFS: Unable to identify CD-ROM format. 23:06:55 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff0f0000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 441.720759] EXT4-fs (sda1): Unrecognized mount option "debog_want_extra_isize=0x0000000000000000" or missing value 23:06:55 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:55 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x180f000000000000}) 23:06:55 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:55 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') mlockall(0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/76, 0x4c}], 0x28f) [ 442.158691] ISOFS: Unable to identify CD-ROM format. 23:06:55 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', 0x0, 0x0, 0x0) 23:06:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debpg_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:55 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:55 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x1f00000000000000}) 23:06:55 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') mlockall(0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/76, 0x4c}], 0x28f) 23:06:56 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:56 executing program 3: r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x27c, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x10000, 0x80000) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x7}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000200)={r2, 0x6}, 0x8) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x6, 0x84202) prctl$PR_GET_SECCOMP(0x15) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r3, 0x6, 0x15, &(0x7f0000000080)=0x68c6, 0x4) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f0000000240), &(0x7f0000000280)=0x30) r4 = add_key(&(0x7f00000002c0)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)="017f7da3a26179ce336042929c561f701feda5ebc71034a5d1a15ee06960cb727b297dd0c0065a47b762231a8c403759c59c5126ef3eb7141f7a481f246a8b7e14c6d37319e4cd593781a3825b47283fb618bec1ea7537649d557d1f92ada5f0a1ad6549f9ea203c06e895ae2ecb603f6ced42d0b4b17123c585da63273fdce9214a1de269592f668ed0c447da9b1fde481a22344f659c6d9d4c3c20c73496740a6b2f7f674fabe2d0ca5242cff28ed1682eb2010090d441375c750d48c029271b400ebe600c471227e2a372210769f4d202af858c2bd1cc6945270976fc5f1290cb77c4022ce39ebd8475bf25935d97f950e0558db4b536892faffb8ea51e58a6a73df8bc3332f913c6f1c2a4fb10ac3f4310662a67ed79236aab92fa5744b893438abaddb0dc54abd404598c9f302ffb317a88f61f208ee89b627fc526cc01f04605b23b13c88b9175ca550ce980f6eb019a876f364a2a051771211339614da8cdf15c4a64a90ab75becca1ced6efae9a8d99869937f61c6db3d416cbfec6dac468ee21c7e924470e775690126ae45292832e2daf513a4c9b5a528078836355f452b55ec8c9b2f78189655f130b30cddd8570667cb3937760886daa75904626d9df0b8b73ed7136304bfd7a9eab77af819ceafca4e4737dc56dee0ceb3c2d7e14d35d15c5e69a1913ca9a5a0ab41525aef79c59a44112cfc0031988ff233be10950b3a7197bab593d147ff77c855a57890b7166dd2618e74e539170a45abf3db0ab956f6d52f7f5e1b3a175b7a699b91960bb51d62cacdf36c4f5338e519639c56d851719c95d576ade0ef60e3b6e25371a02689fc13acceabf0ade17b96817568a43de9e8047d8a47a90e7733a9813a4db9b96d7e0a7aac163c562be860ea246679999ec3db36c4e9f6ca81a419b20afd6d7d21d493b2beb8069ad38ca5c20cfc9b4cc6a74f4a256d37006f30c8ed4d1e0615cb24f13984f6382802972055b9432151f0870840200bb6b4a60898714faf6ea56a29629c993e68e61685d3d9c416fb3808f9b5d608a19db87bed910bf103828437f8cc06edce5d70d9361f4bbd8a6ee1144627e1f74e43008a1ec49becc2960bca46d8f21109de8fbfa1ef70e5874e1823b4e5897117585b1e733a7df58b904681c7a198c58525b114bb8df966095b0de200018851692b75e6967c13b47cab650526d31e0425a96f957e3b5c8a90695d59bcf52673bf6d95a9f128d6c485cfcfa4d66228e836d9a466bcec3dc4c408976949d3b54eb16fc9f55b175c1b9eef70b9bf51c3d22668bbf04da509f810b0a991e95f2427880e1284538290c4a7840b8211d15461978e4b3ad07d70ba3f7b517a742fa99571c05416719209fd93dc8be470e9ce1c5e4c2274937645b7dd928b23fc6dd2840fa7690dc4cbfd01f7f9d52d1c9e7f8badc9a541b222f1501c596e11d227451f84234fa18d42fd231590d6ad4e7e9dea7d29ea5a8e803139dd7a4e4aa25a3cf6d0e08779761be78ab33619666bebc2df50f7260ee14a1bcb2a5deda5ea6933d56e2ac55c560de7e8e0cef652f42dfe888301ba6819548ca8bfb71dfcc0dc66ef4b242037eb24b3ec41a7d630bb4b690bacd678db54e404e07edcc5a5d356c144234e351ecf577ed4cf7a25f93316c6219e04a7ae0ebeb3b3f3f0600c4e94c771b216c89ea72ff97a993639a5a4962dcf1836ef8e1ad5f7f968e46df4878e5c9c0ba6067ee451b8be74f8e8d084efdcbfd1c7ec3c775bb670772c7b4ebfa7adb81228cec78e458042255bb45fb6af2b8b8aa97bf5b287d8f99d43c07c7c66c3edc2ae38d509a0700f57322493030cac3b57ac26e6c1e2fc414566815eb58e9ea9a032cff3f3ffcfe1a782e577ad3ff47a5eb7f70d4d50e0fe85eb3f131c41f3637d087314a0ec3c1f4daf94e571f1560232df03fb7ca2ca7157c1e33c7ad6254ccb848bd92cb5404f3ecb8264d4b2ed70cedae4c2265c093b3b5aca8b1545bd806407f5eb15d2d98f71c45d8d476c1c4669d463f0acc9be872fdd5d26fbbb682f4c14eb3e2a2172305e58f687df6d99ed1a22ac47da03b98ae4f690f69acb09ed3daddfe1b7f0997dc838894457af779276af0cc36a21167dc60b6132a33a3d8d2e9abd4754d3775560e7e63aa08379d420cd191b6c983d90f3ceec9ebedbd6b49a9d2dce78434b7f7da8c5d14ed1c85b7c0ee80953795baf8ba8ac98c3aca11efcabc39778cbe08f1dd04af14884aafcf6c3a7626938b7ad7432a6e1e580c30321c8c5bbd94a51d7f75a195bb19bcda12d234a2636923d5978bcc1660db611db268280903e7ac5e0022d6e31bb17c0a375b6de19595eee1ec98c1624bf11a9be5156545bdd0ee6bd7154c13676d7240d788a16d736309d04ec5e6948f67a418b702e31b9fe93b29e55252f5153f944ec31077c0592b7c932e87c55b663465de4113b59976b8ef0fb31bb264c4103d7b5c4b58834c5bbd1175a8edd5c9b18f49ae1abcedc1ae9f5e5f7eb0594496a5bdc91d648cc0608866a45c0f435cf68f42beae86bc04b6613d6c72d749134ecaaefea8a2c48a3703cb464ea9c4d60aa6dd302838ccc5a0c38cfa7737831879f6c73e6e8e83af32f3b57bc991f0998f53cbc25c48a35a7ea7adc0928925c90110c4ead9dbd7843b144ef1bb7d796c27588904f66f953c6a6a2958b9c4fc473b9f168884c6842733abb0b46838c24c059c060d544aad119283f96a0af04c363b38b07764863a2abbe0d6ba9b168dd776a3ba216eb9eb6c4734febb38044db3a4d7d746a742aae5bc905095f3962aa2779451070bce0a9bad30608fe6ae1296951b72bbff5fd80f375c92b56fc463b91fe843bbdbaa19d079f4b43dcb71b25c8b75e5d6e449c7aa5d87024c355120050b19aa8f07c1473ed7939e5c33b48d3a268550f4d963045c305f0f7cc58230e5c3dd9e79cca6be3383ded04eced2ff3fcd73de4820f46f7ed7089feda08a51c6bc52c9b0da3303c0e6a849c3fa2d4bf8c11c95d8a3edff7cde57b6eabf5c6503867c5a7ebdb6b36bb8e31c197e08825678ad1049e37704ccd21552d3d3735137115d8ee144be4e00d53cad9dc9074d4a86b56b6247da71409d0d6b4c94790ea4427b7adcf3b043cedfd9505c6c20d1979450b69c66011d54901ccc8a774e751914b28a3f6eb05692821a90737ce6a1dc1e71cbbc64ed63a07a9f1d094148fa03b121008811350db8fd9323a801732bd13b60cfcc5d391d8cea4a337a14600129f0a43cf8ca0fd9a0d5876c64af3a666fa949dcbb06d81a72ab7ab216218f2ac1aff4d674ba72e9bd4b30122b3f3a5651233f39e9d25fe309f09554793ca4aca0bf0711e9050eb60e0e35681eae09cef87c7a2be72556f364595d5ca5c33d8a328813db445f6fe2b5de0bb439b1f87fb3de257b03117230fa6f74395ac342ee9d0d55ed3872a04ca5905f0fca0b669bdb2de88bfd6fd86d81049aa8672fb9a0ccae5287b7bafb24efe84addfdc5ba421fb5075644a8db347ee31ecb0bd9e59cf8e02d55acfbfb4d87ceb975765f7385b0b83b3b0ef5f2d78a3e42cef8ac4f22b778248f1007020ef624740927f99d8f354c61a8651e5b6fc9a9c45dbece8f4aa284e5922e8648a554b1e9056b8e6213a5f1d7fad43b64e59631261d6ffac9dcddf40a40e8891163c7a30c0aa8c43425bfed12b0c5c492721109ddf571efa2e3764976eb0583ec305cfea4c32ffafef1382694ee0622ccb9138500819d6fce0eda0216f933b87c95daf7e7b9806a5077a0c7d918b4b753cc2304ed8889bbe2ee33816caf37a9dfb5b4d94fc3082db282bc00dbae1e2ce22f23be204cb0546d3d482df799562073a954294e5e92946bb271e9442b2ba5aa680337af259d5a3acdc89c1f76140b6c46ed61ff3849146c3c15a5f0773923f0c81f9d218d58f9a0aaa70e472c8fcd4403acb6ebe0980fe989b96cd396c6fa7852ac039fb0ad910831c1a0b74eac15522a3f92fa20b9ef9026eef33b81f83fa39d35717e637caa037b38588c075994920777a0c1a99a46ac95eb4fbfb6b5d5ecb1de56b0155be1be47d6e0edaad20ad24b7fb42d7606e51b742ed70943484ea1691aa7322ee7800c18f1dc538da8060c7d9e9af17520c7c62db823eed1f00bc2ef3155b9fddb0f852217a5ae4dc327911107631708b7b412440162bb5681879cd9a65a3dc90facda5331b312c4a32ce2e02d59264efaba2355a9b259debebd23d7f2a175f421c01eae4a95b4888a8b8850460efbd8e795c9ee9bee071297863c66a661ab59fb9bf2f9397b8338f9e960a6587eaceb98cf857bc88f9a348c582ac508476f431051b0b6280bf49b41c21f683ae6e18d7667d317e6d8f70bf78759d11d5e6e05faaf7c89070c48e87de37d2b6bfee6f4b2e03fb43363938afd4c6c2c45ca7fca45d969540e1fdedfbdc7d4e2e6426fe80ee970f384489942b92d6a9bf54401ec44863fbdf9146937c980e3f62b03ac9dad5993b21ac9c737c91cfb92aeb4b8516feaa4a421b274d76b017f9a924d5052c21f35450f3a66641255a9a21ad56898f85aa7888d885dc0da6dc7e9d84b2d5db3feae0289d6a128e76fd5f6753deab3beb8c8fd67c0ab8d872b430edfda5b065e8247bf7613ae793fee47bb6523877594ca73fd60089d4ecc673bf13fe624a387be1eaefa1519a155dc08846488cb6d4005fcdda9b018e054f0017eee46a5f1d78c14229f6c371030fc2a12afea1c8ed7b1259bb4065f0b0753ce47430c86a72a56db923f0773821c7ebb8cb88d7c3ffe639ae6b27a802348414018e321ab07ca2f6312c0e1b6a5ca361a80f675f30d79072b42a43b8735580b57aa3eef64cbdbd4ad1ea1349661676d2e2977a9772947a0d4cc1a96c120cc6b147333706e52a81c808ff3d1793aad47c35df15252bc4470570c35ecd5387ef4a11956485b6f7e03dec65f86cb960f7bd6e2910a6a14ddc0079feedd64493ef3ed649166a30b8b74e6812156a2ab995a1a845499d83615e3a46f6514617190d0ff4f2e8c3c4f39a71e85602b5f1ed65940e25b7daf2450521140621cd9bcce38bc35ed8ac7b617636ba68ff39ed7ad88d7f420643ac7c1e62a5ec853f4b1abc95c60219bb2f414a19fc189cb18f69143ca64a8ee5682332d40150dc2306d6b8d25040b657914ff73df53664caf1c8b730648504264bb597ae58b2eb57cf867d99e5567e7f379654c2f022b9b377ebca1ec64f89cf55f6b586db41aea2d0454d4888a186e9e3a197765083fbe11ce7d28875a3db33aa43c01608eafc2a126f2823aa9a0513a6195c573db44cf2f8e65e980965d68349fe5bdb1c7dac8be8526f37201e64da8176e61721269b6053d562a868c2959c812f620290833963e0dbd18e4acc1b4fc9a454b28a399cb8883c74a731a1487153499d12f9c0dbdec398c9e43292d78cb6322fe549b271335c12c943f2173c84e766ee050d3773b811602f087b7de7b6a994a09a5a07266cd34afe374b193a91147ce889f0fca1709d55ddd350a5add81de3041dc4a3a176396397401999cc6c2b92afc4189138f3d041c8ce1f49ef6444c376dad84f755d5adf481fc4e3f8466db3a9ad7e3188aa64ed28ae92f718f342fa646ea9ccb9e6c398300614107949e8c9da45e2782cfd16a0fcd416a7be8bb04c39f24317056787b6d1d03311f935ea368b1081806dbf48799bd83cf85c224106492dc530c613a15f2451ce9ab6d66efc8333d8cb93ad6c1987a9dc9fc87bc602f76b01ce9acc0db557066e5ff24613", 0x1000, 0x0) r5 = add_key$user(&(0x7f0000001340)='user\x00', &(0x7f0000001380)={'syz', 0x2}, &(0x7f00000013c0)="2c943ebb56370d433978d99332a9e33688b5c74c509f8d09816d3d9fb5561723a29e72a701d74ec41b6b1707cfe791ac4d3e86e059f32a34dcff84aeedd1dff3b2935d02eaebf8077fa01d23051924e6703d421cef5b9ff14547cea1c86a2d18ca266ea9cf4810258d9ce063261cc65d8ec17717740f21de9f2888b7cda5c61ae217147829cef920dc801774cf65bf86f0bfbd7b6b8046cb670b99e007d07c47431ec6cdd161591ace094148fb91a42f6ed5ed0450b727b19131cc3ef97c323b34e4ab13986228c5c8b119f68d256f74d29758efa8adf3548499780672d3b7d3acaf953fa1fc4db7d372be87190056fef9ad", 0xf2, 0xfffffffffffffffa) r6 = add_key(&(0x7f00000014c0)='id_resolver\x00', &(0x7f0000001500)={'syz', 0x2}, &(0x7f0000001540)="1970fdc40fa308257e15e7aef27655711dbbee", 0x13, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000001580)={r4, r5, r6}, &(0x7f00000015c0)=""/244, 0xf4, &(0x7f00000017c0)={&(0x7f00000016c0)={'sha512-avx2\x00'}, &(0x7f0000001700)="46da5186837943364ca46913e40f6cba59202d64d67afa888b9573a52f4822c0e791bbd2762c26e71c7ed09336d24d084ecb951acd500b60e272db762daebda6d6a1a0d1dc869eb14ac5f8dc363181fe8123edca610b764ec0285c6fb3a47141bda2688a806df14b7974a6f9fa641c91940960fc292354bc841a1337929d49a52061b53b145f8e9cf0ab497e12cdb822d3e11a8dc9b43624149b20f8ffe475ec77ad", 0xa2}) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x6, 0xfffffffffffffff7) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r7, 0x84, 0x4, &(0x7f0000000000)=0x9, 0x341) [ 442.548725] ISOFS: Unable to identify CD-ROM format. 23:06:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x2000000000000000}) 23:06:56 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:56 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:56 executing program 3: open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x3, 0x0) fstat(r0, &(0x7f0000000040)) 23:06:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debsg_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:56 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000080)='security.capability\x00', 0x0, 0xfffffcfd, 0x4) 23:06:56 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 443.034669] ISOFS: Unable to identify CD-ROM format. 23:06:56 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') mlockall(0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/76, 0x4c}], 0x28f) 23:06:56 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) futimesat(r0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000040)={{}, {0x77359400}}) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0x100) connect$bt_sco(r1, &(0x7f0000000100)={0x1f, {0x100000000, 0x10001, 0x8, 0x3cd5, 0x80000000, 0x7}}, 0x8) 23:06:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x2d00000000000000}) 23:06:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debvg_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:56 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:56 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x10000, 0x202) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000100)={{0x0, 0x5}, 0x10}, 0x10) socket$inet6(0xa, 0x5, 0xfffffffffffff47b) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x24, r2, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffff44e}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x810) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x4, 0x45}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000001c0)={r3, @in={{0x2, 0x4e24, @rand_addr=0x2b13}}, 0x0, 0x4, 0x3ff, 0x7f, 0x42}, 0x98) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000140)=0xf5) 23:06:56 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./bus\x00') ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000005c0)="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") r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x46, 0x0, 0x0) 23:06:56 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x804000000000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:56 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./bus\x00') ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000005c0)="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") r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x46, 0x0, 0x0) [ 443.462614] EXT4-fs: 4 callbacks suppressed [ 443.462627] EXT4-fs (sda1): Unrecognized mount option "debvg_want_extra_isize=0x0000000000000000" or missing value 23:06:57 executing program 3: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 23:06:57 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:57 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x400c330d, &(0x7f00000000c0)) [ 443.671311] EXT4-fs (sda1): Unrecognized mount option "debvg_want_extra_isize=0x0000000000000000" or missing value 23:06:57 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') mlockall(0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/76, 0x4c}], 0x28f) 23:06:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x3f00000000000000}) 23:06:57 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x400c330d, &(0x7f00000000c0)) 23:06:57 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x80800, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 23:06:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debxg_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:57 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:57 executing program 3: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x279, 0x2) fsetxattr$security_capability(r0, &(0x7f0000000040)='security.capability\x00', 0x0, 0x0, 0x2) 23:06:57 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x400c330d, &(0x7f00000000c0)) 23:06:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x4000000000000000}) 23:06:57 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200000000000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 444.052715] EXT4-fs (sda1): Unrecognized mount option "debxg_want_extra_isize=0x0000000000000000" or missing value [ 444.161406] EXT4-fs (sda1): Unrecognized mount option "debxg_want_extra_isize=0x0000000000000000" or missing value 23:06:57 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x400c330d, &(0x7f00000000c0)) 23:06:57 executing program 3: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x27a, 0x100000000) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000040)=""/45) 23:06:58 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') mlockall(0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/76, 0x4c}], 0x28f) 23:06:58 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x223c020000000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debu\n_want_extra_isize'}}, {@commit={'commit'}}]}) 23:06:58 executing program 2: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)) 23:06:58 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x20000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x8}, &(0x7f0000000080)=0x8) prctl$PR_SET_UNALIGN(0x6, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={r2, 0x100000000, 0x80000001, 0x6, 0xa74f, 0x3}, 0x14) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'ip_vti0\x00', 0x8800}) 23:06:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x4800000000000000}) 23:06:58 executing program 2: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)) [ 444.635760] EXT4-fs (sda1): Unrecognized mount option "debu [ 444.635760] _want_extra_isize=0x0000000000000000" or missing value 23:06:58 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:58 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80040, 0x0) accept$unix(r1, &(0x7f0000000040), &(0x7f0000000100)=0x6e) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 23:06:58 executing program 2: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)) [ 444.791430] EXT4-fs (sda1): Unrecognized mount option "debu [ 444.791430] _want_extra_isize=0x0000000000000000" or missing value 23:06:58 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x30200, 0x0) getdents64(r0, &(0x7f00000001c0)=""/189, 0xbd) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000140), &(0x7f0000000280)=0x4) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'user.', '\x00'}) fsetxattr$security_capability(r1, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x20582, 0x0) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) 23:06:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debuv_want_extra_isize'}}, {@commit={'commit'}}]}) [ 445.082894] EXT4-fs (sda1): Unrecognized mount option "debuv_want_extra_isize=0x0000000000000000" or missing value 23:06:58 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/76, 0x4c}], 0x28f) 23:06:58 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7800000000000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:58 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x400c330d, &(0x7f00000000c0)) 23:06:58 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x1) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xfffffffffffffebc, 0x0) memfd_create(&(0x7f0000000080)='security.capability\x00', 0x4) 23:06:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x4c00000000000000}) [ 445.215814] EXT4-fs (sda1): Unrecognized mount option "debuv_want_extra_isize=0x0000000000000000" or missing value 23:06:58 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x40) faccessat(r0, &(0x7f0000000040)='./file0\x00', 0x48, 0x1000) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 23:06:58 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug\nwant_extra_isize'}}, {@commit={'commit'}}]}) 23:06:58 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x400c330d, &(0x7f00000000c0)) 23:06:58 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x400c330d, &(0x7f00000000c0)) 23:06:58 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4ffffff00000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 445.488273] EXT4-fs (sda1): Unrecognized mount option "debug [ 445.488273] want_extra_isize=0x0000000000000000" or missing value 23:06:59 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x1) 23:06:59 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/76, 0x4c}], 0x28f) 23:06:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x6800000000000000}) 23:06:59 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)) 23:06:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debugvwant_extra_isize'}}, {@commit={'commit'}}]}) 23:06:59 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:59 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x800) getsockname$inet(r1, &(0x7f0000000080), &(0x7f0000000100)=0x10) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x102, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 23:06:59 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)) 23:06:59 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff01000000000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:59 executing program 3: setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0xa1800000000000, 0x82) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x8}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000200)={r2, 0x3}, 0x8) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', 0x0, 0x0, 0x2) [ 445.949417] EXT4-fs (sda1): Unrecognized mount option "debugvwant_extra_isize=0x0000000000000000" or missing value 23:06:59 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/76, 0x4c}], 0x28f) 23:06:59 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x400c330d, &(0x7f00000000c0)) 23:06:59 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f000000000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:59 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xfffffffffffffec7, 0x4) r1 = dup2(r0, r0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000040)={r2, 0x2}) 23:06:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x6c00000000000000}) 23:06:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_\nant_extra_isize'}}, {@commit={'commit'}}]}) 23:06:59 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:06:59 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) faccessat(r0, &(0x7f0000000000)='./file0\x00', 0x2, 0x400) 23:06:59 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x400c330d, 0x0) 23:06:59 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/76, 0x4c}], 0x28f) 23:06:59 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x400c330d, 0x0) 23:06:59 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) r1 = userfaultfd(0x80000) fsetxattr$security_capability(r1, &(0x7f0000000280)='security.capability\x00', 0x0, 0xffffffffffffff87, 0x10000000000) r2 = openat(r0, &(0x7f00000001c0)='./file0/file0\x00', 0x40000, 0x80) io_setup(0x4, &(0x7f0000000000)=0x0) r4 = getuid() getgid() getresgid(&(0x7f0000000200), &(0x7f0000000640), &(0x7f0000000680)) getgid() stat(&(0x7f0000000500)='./file0/file0\x00', &(0x7f0000000540)) getgroups(0x0, &(0x7f00000002c0)) fchownat(r0, &(0x7f0000000180)='.\x00', r4, 0x0, 0x1100) accept4$alg(r2, 0x0, 0x0, 0x80800) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000380)={0x87, @dev={0xac, 0x14, 0x14, 0xd}, 0x4e21, 0x2, 'wrr\x00', 0x6, 0x7f, 0x36}, 0x2c) io_cancel(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0xfffffffffffffff9, r0, &(0x7f0000000040)="45912157ef6f43ffba25f2c3f1e54f97e37a71ac258e69a548c82483d2e4bc028d5193320022a1097c387bd6f9a66cef683b87c9542d9fe283b13529833f8b3c7413b0a26e837ad3805b76d69eaebb09ad2c34", 0x53, 0x0, 0x0, 0x1, r0}, &(0x7f0000000140)) open$dir(&(0x7f0000000240)='./file0/file0\x00', 0x400240, 0x800000000085) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rfkill\x00', 0x0, 0x0) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEY(r6, 0x110, 0x1, &(0x7f00000003c0)='security.capability\x00', 0x14) ioctl$SIOCAX25DELUID(r5, 0x89e2, &(0x7f0000000340)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, r4}) 23:07:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_w\nnt_extra_isize'}}, {@commit={'commit'}}]}) 23:07:00 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x400c330d, 0x0) 23:07:00 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:00 executing program 0: mlockall(0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/76, 0x4c}], 0x28f) 23:07:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x7400000000000000}) 23:07:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000180)="fa8a814a03644a8d2a1ac7a1fb34ce8c7e2977a15ff4dceed8943f68b9d62c8de3bc2658301e5f", 0x27) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000000)="79ffc928fdeb82149aefb00edf65ff3d", 0x10) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000440)=""/142) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, 0x0, 0x800) sendmsg$nl_generic(r1, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000001440)={0x14, 0x17, 0x101}, 0x14}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='sessionid\x00') close(0xffffffffffffffff) r3 = socket(0x0, 0x3, 0x8) openat$cgroup_ro(r2, &(0x7f0000000300)='memory.swap.current\x00', 0x0, 0x0) ioctl$sock_ifreq(r3, 0x8923, &(0x7f0000000040)={'team_slave_0\x00', @ifru_flags=0xa201}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000002c0)={'syz_tun\x00', 0x0}) stat(&(0x7f0000000000)='./file0\x00', 0x0) bind$packet(r3, &(0x7f0000000080)={0x11, 0x0, r4, 0x1, 0x200002, 0x6, @dev={[], 0x13}}, 0x14) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x210000, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r5 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r5, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 23:07:00 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x200000000801, 0x0) write$uinput_user_dev(r0, &(0x7f0000000c80)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 23:07:00 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 446.959702] input: syz1 as /devices/virtual/input/input11 23:07:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_w%nt_extra_isize'}}, {@commit={'commit'}}]}) 23:07:00 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:00 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:00 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:00 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000, 0x10) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 23:07:00 executing program 0: r0 = syz_open_procfs(0x0, 0x0) mlockall(0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/76, 0x4c}], 0x28f) 23:07:01 executing program 3: open$dir(&(0x7f0000000040)='./file0\x00', 0x2900, 0x0) 23:07:01 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x7a00000000000000}) 23:07:01 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xffffffffffffffd6, 0x0) r1 = dup2(r0, r0) write$FUSE_STATFS(r1, &(0x7f0000000100)={0x60, 0x5, 0x80000000008, {{0xb433, 0x3, 0x8000000c8, 0x8, 0x54d, 0x9, 0x0, 0x80000002}}}, 0x60) 23:07:01 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_wvnt_extra_isize'}}, {@commit={'commit'}}]}) 23:07:01 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) r1 = semget(0x3, 0x0, 0x10) semctl$IPC_RMID(r1, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x210000, 0x0) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000000040)={0x6, 0x5, 0x1, 0x3, 0x1ffc000}) 23:07:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x8cffffff00000000}) 23:07:01 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:01 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', 0x0, 0x5, 0xffffffffffffffff) 23:07:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_wa\nt_extra_isize'}}, {@commit={'commit'}}]}) 23:07:01 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:01 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') mlockall(0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/76, 0x4c}], 0x28f) 23:07:01 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 23:07:01 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 448.494076] EXT4-fs: 8 callbacks suppressed [ 448.494089] EXT4-fs (sda1): Unrecognized mount option "debug_wa [ 448.494089] t_extra_isize=0x0000000000000000" or missing value 23:07:02 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') mlockall(0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/76, 0x4c}], 0x28f) 23:07:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_wa%t_extra_isize'}}, {@commit={'commit'}}]}) 23:07:02 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000000)={0xf, 0x103, 0x5, {0x5, 0x5, 0x800, 0x7}}) 23:07:02 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0x97ffffff00000000}) 23:07:02 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') mlockall(0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/76, 0x4c}], 0x28f) [ 448.852774] EXT4-fs (sda1): Unrecognized mount option "debug_wa%t_extra_isize=0x0000000000000000" or missing value 23:07:02 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', 0x0, 0xffffffffffffffe5, 0x2) 23:07:02 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 449.024714] EXT4-fs (sda1): Unrecognized mount option "debug_wa%t_extra_isize=0x0000000000000000" or missing value 23:07:02 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:02 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:02 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200, 0x0) write$P9_RLOPEN(r1, &(0x7f0000000040)={0x18, 0xd, 0x1, {{0x2, 0x1, 0x3}, 0x8e7}}, 0x18) 23:07:02 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') mlockall(0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/76, 0x4c}], 0x28f) 23:07:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_wavt_extra_isize'}}, {@commit={'commit'}}]}) 23:07:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0xf6ffffff00000000}) 23:07:03 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 449.496327] EXT4-fs (sda1): Unrecognized mount option "debug_wavt_extra_isize=0x0000000000000000" or missing value 23:07:03 executing program 3: r0 = open$dir(&(0x7f0000000000)='./file1\x00', 0x278, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 23:07:03 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x408, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:03 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x1) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000040)={{0x101, 0x1, 0x1, 0x42, 0x101, 0x30}, 0x7}) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fcntl$addseals(r1, 0x409, 0x8) fsetxattr$security_capability(r1, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 23:07:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_wan\n_extra_isize'}}, {@commit={'commit'}}]}) 23:07:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0xfcfdffff00000000}) [ 449.970594] EXT4-fs (sda1): Unrecognized mount option "debug_wan [ 449.970594] _extra_isize=0x0000000000000000" or missing value 23:07:03 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:03 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:03 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) timerfd_create(0x8, 0x80800) 23:07:03 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') mlockall(0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/76, 0x4c}], 0x28f) 23:07:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_wan%_extra_isize'}}, {@commit={'commit'}}]}) 23:07:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0xfdfdffff00000000}) 23:07:04 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 450.568899] EXT4-fs (sda1): Unrecognized mount option "debug_wan%_extra_isize=0x0000000000000000" or missing value 23:07:04 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x3) 23:07:04 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x59) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x101002, 0x0) connect$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x10001, {0x1, 0x33, 0xff, 0xffffffffbb7c0386, 0x1, 0x8000}, 0x3, 0x3}, 0xe) connect$bt_l2cap(r1, &(0x7f0000000100)={0x1f, 0x7, {0x5, 0x6, 0x9, 0x3f, 0x2, 0x3}, 0x3, 0xfffffffffffffff9}, 0xe) fcntl$getown(r0, 0x9) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f00000001c0)='security.capability\x00', 0x0, 0xfffffd6e, 0x0) [ 450.753548] EXT4-fs (sda1): Unrecognized mount option "debug_wan%_extra_isize=0x0000000000000000" or missing value 23:07:04 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_wanv_extra_isize'}}, {@commit={'commit'}}]}) 23:07:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0xfdffffff00000000}) [ 451.072795] EXT4-fs (sda1): Unrecognized mount option "debug_wanv_extra_isize=0x0000000000000000" or missing value 23:07:04 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:04 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x280100, 0x0) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000100)={"c3746144f39c381eb609cd1f5f036590017bdf52bcb98e4994d5a4ad07b0cb90a77bb4234600a14d2442a12d167a298884608a87c40f7a452911e07252de851c0260ac6d9b7a0a8b01b73ef18d187fe66706bd33a2979b71e3b5fd322bfabbbc9906c9a218efe2a3331342866c326ffe5b0389580f44489b7abe416832510f189857ce63dc4469730de0dde1a1ab881abdc09697edfc2d13bb0c17dcf80b789f8a808668ff57f5de5876a489bc0ef1dbd20e0161c4fd9beb4a9a8621675fc7842d73561a77cec6a3921977bc9737de268b9a7cd62fa57a60d21d89dd9d60e55b95a7a56684929872bbcc4c96ef7bb90750e6eb6b6bee0f41eb5569dfd3f71f79fa1676d9c64632f9f1394307f294e9c9d2fa9a95fd55c2a1c34611d71863eaa34786fcc2510881310f2b075a878a6e2b0267554f309fb9bf53e5f6369211b5bb371005025abc7e8d11f37ec80ed2fac751f908515a30e77b075d5f72f1198630492e4e5e184ba4648052aaef2a36f3a4917bb5b8bdb555290151d21bba9f29785adf51749f035fc439706be83f6bddde6bfb0107abc60222a8a0e3ca33bcdcb51f17ac6ff172cf9a8c6af9482d609b3f9e8016255229d62e9540e789d96d14032b0492736699151831e79f256ac002175d5f7e27cb391c312faa48f232ba39d747cde7d2df3920588188cfa76cc2871956e5eb8f78ddb20b15b70a700baff8372c40670ca7b1c532522281d1ff48430f73b61920f7827f430268ad22b8eb4a7cf2f6652cae9ca9dc49769440fa134ffca74ff014c6e71c98b92fcb80277aa7ff86e642c1e2fa5d07e2c61ba83b00bb5a78b1cda152c109aca78de5f1c45a89bd3cb23dfcee934f9e84d57dbf7657a987ab28800b18a795383a2500b19ff5c79a1f469ffcb95f02796ca37ee996e327aed9e5671684194888d51ae3bdc7c587df3e18699c82b65203dae79170e2b2a244bcdc4a4f078ce4b250899d2542e91d344667232f1435cd0941d8c653bb486c7007b45ca2b8af3590d7734fd2767ad99a6f2bc35a6b35ad29110d8cea9dbbd4f797de65d5cf0d4cdb649865c8b3e561129adc4debe66dbc0b81b940c67ffd8bca462ea22c09439d10cdd843e830c6cd7182c9d190efbe26115c792445599612d5166fcc94d128fc7bfad25431a1e06ee4a34db574a65f5ad86406c6bafce081f7e67251aeaff13b485d4ca6ee9f5b7ab670ef8b94e885bbfae5eb94d886ae235cb8d6473a51b03413e496ad952260fbf10ea8ebd21499d8a4644180873c0d20c9027596cf9b721e565f63d911fa4b9f5fbedee7c1d202a7597c54e2f28fc18dd9d9476ac3cd69315a613a5a838a69e2eb730b3b639aacf16504fa78c85c358dafb0fc20e0e46a5ecf5a14f380f3e5c1c64f5829fca617736e01425b8f3e5458449670336e206d5856c9f5d7bfa67a71f4"}) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', 0x0, 0xd7895f03a040806c, 0x1) 23:07:04 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x804, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want\nextra_isize'}}, {@commit={'commit'}}]}) 23:07:04 executing program 0: syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') mlockall(0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/76, 0x4c}], 0x28f) 23:07:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0xffffffff00000000}) 23:07:05 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000080)={0x0, 0x80000, r0}) getpeername$unix(r1, &(0x7f0000000280), &(0x7f0000000300)=0x6e) r3 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x8, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000140)={r2, 0x80000, r3}) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x4c0000, 0x0) ioctl$PIO_SCRNMAP(r4, 0x4b41, &(0x7f00000001c0)="a932de2ad000f09dca0bef55bca46c5600936e59a3fe42accdf1817e04ca7ac0f328f9c5ca8fdc2d52586a708f6f77d16af518ae384d7ef85f75248e6bde1da537e26aed6c890f831668c8bd62930d4dc4d02b16531d02f6d7fb8d7e8979d6a8a8725ca340febcb2ba303291d42fc1a701e30da7af443678c9f87a011c7a0b1511b5a617118c803a83dbae4fe66146a74c197fc98b174358561c07b530def9d0db34f08e14f316540b30e42b8a04") 23:07:05 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 451.627352] EXT4-fs (sda1): Unrecognized mount option "debug_want [ 451.627352] extra_isize=0x0000000000000000" or missing value 23:07:05 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) [ 451.761278] EXT4-fs (sda1): Unrecognized mount option "debug_want [ 451.761278] extra_isize=0x0000000000000000" or missing value 23:07:05 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', 0x0, 0xffffffeb, 0x3) 23:07:05 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_wantvextra_isize'}}, {@commit={'commit'}}]}) 23:07:05 executing program 3: r0 = open$dir(&(0x7f0000000000)='./file0/file0\x00', 0x400000, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040)='security.capability\x00', 0x0, 0x0, 0x0) 23:07:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0xffffffffffffffff}) 23:07:05 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:05 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') mlockall(0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(r0, 0x0, 0x0) 23:07:05 executing program 3: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x27a, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x3) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 23:07:05 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7800, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_\nxtra_isize'}}, {@commit={'commit'}}]}) 23:07:05 executing program 3: openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/attr/current\x00', 0x2, 0x0) r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x184, 0x1) 23:07:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) 23:07:06 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8008, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:06 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:06 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='minix\x00', 0x804000, &(0x7f0000000100)='security.capability\x00') r1 = getuid() setfsuid(r1) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x1) 23:07:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_%xtra_isize'}}, {@commit={'commit'}}]}) 23:07:06 executing program 3: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000040), &(0x7f0000000140)=0x40) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000100)=0x4) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x1, 0x0) fsetxattr$security_capability(r2, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 23:07:06 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8800, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:06 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') mlockall(0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(r0, 0x0, 0x0) 23:07:06 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB="636f6d6dd9743d3078666666666666666666666666666666392c00"]) 23:07:06 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) r1 = dup2(r0, r0) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="210000000701001400734e637572696c6974790004000000000000000000000000"], 0x21) fstatfs(r1, &(0x7f0000000040)=""/12) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f00000001c0)={"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"}) 23:07:06 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff01, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_vxtra_isize'}}, {@commit={'commit'}}]}) 23:07:06 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:06 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x40) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x2001, 0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x40000, 0x0) r2 = getpgrp(0x0) waitid(0x3, r2, &(0x7f0000000100), 0x40000000, &(0x7f00000001c0)) ioctl$KVM_X86_SET_MCE(r1, 0x4040ae9e, &(0x7f0000000080)={0x800000000000000, 0xf000, 0x8001, 0x1, 0x16}) [ 453.625431] EXT4-fs: 6 callbacks suppressed [ 453.625444] EXT4-fs (sda1): Unrecognized mount option "debug_want_vxtra_isize=0x0000000000000000" or missing value 23:07:07 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "d40e83e9873b1792a8abc28dec02efb4"}, 0x11, 0x3) 23:07:07 executing program 3: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) r1 = open$dir(&(0x7f00000000c0)='./file1\x00', 0x27a, 0x26) r2 = fcntl$getown(r0, 0x9) process_vm_writev(r2, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/255, 0xff}], 0x1, &(0x7f0000001680)=[{&(0x7f0000000140)=""/47, 0x2f}, {&(0x7f00000001c0)=""/61, 0x3d}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/167, 0xa7}, {&(0x7f0000001580)=""/108, 0x6c}, {&(0x7f0000001600)=""/66, 0x42}], 0x6, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x80, 0x0) ioctl$DRM_IOCTL_RM_MAP(r3, 0x4028641b, &(0x7f0000000080)={0x0, 0xc34, 0x7, 0x4, &(0x7f0000001000/0x2000)=nil}) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@initdev}}, &(0x7f0000000300)=0xe8) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000001700)={@empty, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @rand_addr="4701923a6c544ed7d909d4f841f24e3e", 0x100000003, 0x81, 0x1, 0x400, 0x5, 0x86a00000, r4}) 23:07:07 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23c22, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_e\ntra_isize'}}, {@commit={'commit'}}]}) 23:07:07 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') mlockall(0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(r0, 0x0, 0x0) 23:07:07 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:07 executing program 3: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x100000008000, 0x100) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x2000000000) r1 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) getxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)=@known='trusted.overlay.opaque\x00', &(0x7f00000004c0)=""/99, 0x63) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x2) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000400)=@random={'security.', '!eth0*\x00'}, &(0x7f0000000200)=""/88, 0x58) r2 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x3f, 0x1ffd) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000380)=""/94) mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x4000002, 0x100000002132, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r3, 0x0) fcntl$setpipe(r3, 0x407, 0x80000000) r4 = socket(0x1e, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000280)={0xf5c0, 0x9e, 0x9}) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f0000000540)=""/113) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f0000000080)=""/168) [ 454.012488] EXT4-fs (sda1): Unrecognized mount option "debug_want_e [ 454.012488] tra_isize=0x0000000000000000" or missing value 23:07:07 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:07 executing program 1: stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f0000000240)=@v3={0x3000000, [{0x81, 0x6}, {0x7f, 0x6}], r0}, 0x18, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) remap_file_pages(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x3, 0x5, 0x2040) r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x200, 0x200080) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xa, 0x110, r1, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000400)={'veth1_to_bond\x00', {0x2, 0x4e20, @empty}}) sendmsg$FOU_CMD_DEL(r1, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x14000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x40, r2, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x77}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x8800}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000280)=ANY=[@ANYBLOB="636f6d6d69743d30796666666666666683e0876666666666666666392ced"]) 23:07:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_ex\nra_isize'}}, {@commit={'commit'}}]}) 23:07:07 executing program 3: fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 454.345408] EXT4-fs (sda1): Unrecognized mount option "commit=0yfffffffŕ‡ffffffff9" or missing value [ 454.492905] EXT4-fs (sda1): Unrecognized mount option "commit=0yfffffffŕ‡ffffffff9" or missing value [ 454.600924] EXT4-fs (sda1): Unrecognized mount option "debug_want_ex [ 454.600924] ra_isize=0x0000000000000000" or missing value 23:07:08 executing program 3: r0 = open$dir(&(0x7f0000000040)='./file0/file0\x00', 0x27a, 0xe) renameat2(r0, &(0x7f0000000000)='./file0/file0/file0\x00', r0, &(0x7f00000000c0)='./file0/file0/file0\x00', 0x4) 23:07:08 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x880000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:08 executing program 1: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) 23:07:08 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:08 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') mlockall(0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(r0, &(0x7f00000000c0), 0x0) [ 454.802673] EXT4-fs (sda1): Unrecognized mount option "debug_want_ex [ 454.802673] ra_isize=0x0000000000000000" or missing value 23:07:08 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) prctl$PR_GET_FP_MODE(0x2e) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000100)={0x7, 0x0, [{0x8e0, 0x0, 0x1}, {0xfff, 0x0, 0x1000}, {0x9aa, 0x0, 0x2}, {0xbff, 0x0, 0x10000}, {0xc0010bff, 0x0, 0x3}, {0x3fd}, {0xfff, 0x0, 0x3f}]}) recvfrom$unix(r1, &(0x7f00000001c0)=""/200, 0xc8, 0x0, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e) 23:07:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_ex%ra_isize'}}, {@commit={'commit'}}]}) 23:07:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='commit=0xfffffnfffffffff9,\x00']) 23:07:08 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:08 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000080)={0x8, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}]}) [ 455.160158] EXT4-fs (sda1): Unrecognized mount option "commit=0xfffffnfffffffff9" or missing value 23:07:08 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 455.242356] EXT4-fs (sda1): Unrecognized mount option "debug_want_ex%ra_isize=0x0000000000000000" or missing value 23:07:08 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x7ff, 0xff}) set_mempolicy(0x1008002, &(0x7f00000001c0)=0x1080000003, 0x6) utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={0x3ff}) 23:07:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000200)="6ba4c1fc743488bcf389641cb57a4f446a97308dc63759f8dc24b0e6132ebcfbf553d7158fbeb5a8") syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) syz_mount_image$ext4(&(0x7f0000000240)='ext3\x00', &(0x7f0000000280)='./file0\x00', 0x6, 0x2, &(0x7f0000000400)=[{&(0x7f00000002c0)="88310500e67139df49b105159742815a1092587fa2142ef949c62c2170b88b746f4472622ede01462b29213ee410984d0a87ac61cec7d897891caaa66f1ccc1e07370bcaf8aadc17d9b4045f4cbd921f6b78d4b75fe7d482224f5093645ae94533a1c453ad3457697f6533b16e3ed359e59f410d3bca3e5256829813459616223cb8182ca44f69673649b9794bb0881c5b198f7bf868da5c2e0bc21d8cf2f8c36f", 0xa1, 0xfff}, {&(0x7f0000000380)="5a5539b3b01f2f55911ecdca7a1612f79d7cc9ba18dc3bc48764029132871e2a91869ce9b2e21418171ff1e939b736d409337e4a6fb2107632c11c48e7424fd84ff778213e6b131b1088", 0x4a, 0x10000}], 0x120000, &(0x7f0000000440)={[{@resgid={'resgid', 0x3d, r1}}, {@abort='abort'}], [{@appraise='appraise'}, {@dont_appraise='dont_appraise'}]}) [ 455.350494] EXT4-fs (sda1): Unrecognized mount option "debug_want_ex%ra_isize=0x0000000000000000" or missing value 23:07:08 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_exvra_isize'}}, {@commit={'commit'}}]}) [ 455.807044] EXT4-fs (sda1): Unrecognized mount option "debug_want_exvra_isize=0x0000000000000000" or missing value 23:07:09 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:09 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x40) r0 = open$dir(&(0x7f0000000200)='./file0\x00', 0x82000, 0x101) mq_open(&(0x7f0000000080)='/dev/uinput\x00', 0x880, 0x40, &(0x7f00000000c0)={0x0, 0x9, 0x7, 0x3, 0x10001, 0x5, 0x100, 0x30000000}) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) getsockopt$inet6_dccp_int(r1, 0x21, 0x4, &(0x7f0000000280), &(0x7f0000000240)=0x594e282774e12f3d) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0xd) 23:07:09 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x52d480, 0x0) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f0000000140)={'syzkaller1\x00', 0x3ff, 0x1}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) 23:07:09 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') mlockall(0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(r0, &(0x7f00000000c0), 0x0) 23:07:09 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x47e5, 0x101800) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000040)={0x5, 0x7, 0x10001}) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 23:07:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_ext\na_isize'}}, {@commit={'commit'}}]}) 23:07:09 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:09 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x0, 0x2) r1 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB="636f6d6d697f9bf1be89d743ca2a6f020000000000000066666666"]) 23:07:09 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$CAPI_GET_FLAGS(r1, 0x80044323, &(0x7f0000000040)) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r2, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000000080)=0x6) 23:07:09 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:09 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') mlockall(0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(r0, &(0x7f00000000c0), 0x0) 23:07:10 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x2800, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x1) 23:07:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_ext%a_isize'}}, {@commit={'commit'}}]}) 23:07:10 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:10 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0xfffffea6) 23:07:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000200)=ANY=[@ANYBLOB="636f6d6d69743d3078666666666666666666666666666666392c00b7f143e90d560443a23036ab89a0ea365c5a0300000000000000589626d11b96af2ce76a7370cd3d46d5ef7a0ce55506b2a8839d640979d5263811028dee074ec80ec2c5809f460ecd84be9605ee0bd64deb970d4dec84b4d27fb877d7383aa2abc27c486e113fbea19de8833174e48a7a3208a5776bd98215c3ab7f42190906f927bae8876f4af19ce64522fe651243138f22da149e796c709231ae10a50592bc4671ed58e5c50d1d2f867447892bca0cdc9ff961178b48409febfa1d6488af8a9026503e2cec72c373364f42810d8bb449cd10a6ef5ecdf690"]) rseq(&(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6, 0xffff, 0x8, 0x7fff}, 0x4}, 0x20, 0x1, 0x0) 23:07:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') mlockall(0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(r0, &(0x7f00000000c0)=[{0x0}], 0x1) 23:07:10 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0x14, &(0x7f0000000080)='security.capability\x00'}, 0x30) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x40, 0x0) perf_event_open(&(0x7f0000000000)={0x7, 0x70, 0x3f, 0x800, 0x7fffffff, 0xdc, 0x0, 0x1, 0x8200, 0x1, 0x5, 0x6, 0x5, 0x1000, 0x1, 0x101, 0x7, 0x9, 0x8001, 0x0, 0x0, 0x7, 0x5, 0x5, 0x92, 0x8, 0x87, 0x200, 0xfff, 0xd51, 0x5, 0x1a91, 0x2, 0x2, 0x6ea0, 0x9, 0x1, 0x7, 0x0, 0x2, 0x1, @perf_config_ext={0x7}, 0x80, 0x0, 0x81, 0x9, 0x1000000, 0x45a, 0xbf}, r0, 0x10, r1, 0x8) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r2, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 23:07:10 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0xfffffea6) 23:07:10 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8040000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB="636f6d6d69743d3078666666666666876666666666cb1d2c00"]) 23:07:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extva_isize'}}, {@commit={'commit'}}]}) 23:07:10 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8800000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:10 executing program 3: socket$pppoe(0x18, 0x1, 0x0) r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 23:07:10 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0xfffffea6) 23:07:11 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:11 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:11 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x30, 0x1ff) 23:07:11 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') mlockall(0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(r0, &(0x7f00000000c0)=[{0x0}], 0x1) 23:07:11 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x4, 0x400000) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f0000000180)={0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) set_tid_address(&(0x7f00000000c0)) mount$bpf(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x32ffffe, 0x0) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0xd000) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB="636f6d6d69743d307866666668661b0047d462ffdc9a6666392c00"]) 23:07:11 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:11 executing program 3: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x27b, 0x8) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x24600, 0x0) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000380)={0x5, &(0x7f0000000340)=[{0x7e, 0xffffffffffff0001, 0x8, 0x4}, {0x80000001, 0x80000000, 0x1, 0x1}, {0x4, 0x7fff, 0x5, 0x1ff}, {0x0, 0x30170c5c, 0x8, 0xa75d}, {0x2, 0x1000, 0x2000000000000, 0xfffffffffffffff8}]}, 0x10) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000000)) 23:07:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extr\n_isize'}}, {@commit={'commit'}}]}) 23:07:11 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:11 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:11 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', 0x0, 0xfffffffffffffd88, 0x0) 23:07:11 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:11 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x8000, 0x0) r1 = syz_open_dev$audion(&(0x7f00000004c0)='/dev/audio#\x00', 0x5bb8d22c, 0x40100) r2 = socket$inet_sctp(0x2, 0x5, 0x84) pipe(&(0x7f0000000500)={0xffffffffffffffff}) r4 = syz_open_dev$sndtimer(&(0x7f0000000540)='/dev/snd/timer\x00', 0x0, 0x101000) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x800, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000016c0)={&(0x7f00000005c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4, 0x1c, 0x2, {"d872f3"}}, {0x0, "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"}}, &(0x7f0000001600)=""/136, 0x101e, 0x88}, 0x20) r9 = syz_open_dev$audion(&(0x7f0000001700)='/dev/audio#\x00', 0x9, 0x200000) r10 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r11 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001740)='/proc/self/net/pfkey\x00', 0x8000, 0x0) r12 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001780)={0x0}, &(0x7f00000017c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001800)={{{@in6=@mcast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000001900)=0xe8) getgroups(0x5, &(0x7f0000001940)=[0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00]) r16 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001d00)='/dev/dsp\x00', 0x20080, 0x0) r17 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80000) r18 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/dsp\x00', 0x80000, 0x0) r19 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r20 = syz_open_procfs(0x0, &(0x7f0000001d80)='net/udp6\x00') r21 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001dc0)={0xffffffffffffffff}) r23 = syz_open_dev$adsp(&(0x7f0000001e00)='/dev/adsp#\x00', 0x10000, 0x40000) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000001e40)={0x0, 0x80000, 0xffffffffffffff9c}) r25 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001e80)='/dev/autofs\x00', 0xa00, 0x0) r26 = accept(0xffffffffffffff9c, &(0x7f0000001ec0)=@isdn, &(0x7f0000001f40)=0x80) r27 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001f80)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r28 = syz_open_dev$dri(&(0x7f0000001fc0)='/dev/dri/card#\x00', 0x2, 0x40000) r29 = fanotify_init(0x50, 0x41000) r30 = socket$can_bcm(0x1d, 0x2, 0x2) r31 = socket$vsock_stream(0x28, 0x1, 0x0) r32 = accept$inet(0xffffffffffffffff, &(0x7f0000002000), &(0x7f0000002040)=0x10) r33 = socket$netlink(0x10, 0x3, 0xb) r34 = syz_open_dev$amidi(&(0x7f0000002080)='/dev/amidi#\x00', 0x3, 0x200) r35 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/mISDNtimer\x00', 0x10080, 0x0) r36 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, &(0x7f0000002100), 0x800) r37 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) r38 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002240)={&(0x7f0000002200)='./file0\x00', 0x0, 0x18}, 0x10) r39 = socket$tipc(0x1e, 0x5, 0x0) r40 = dup(0xffffffffffffff9c) r41 = openat$tun(0xffffffffffffff9c, &(0x7f0000002300)='/dev/net/tun\x00', 0x0, 0x0) r42 = syz_open_dev$dspn(&(0x7f0000002340)='/dev/dsp#\x00', 0x2, 0x101280) r43 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000002380)='/dev/rfkill\x00', 0x200000, 0x0) pipe(&(0x7f00000023c0)={0xffffffffffffffff}) r45 = socket$inet_udplite(0x2, 0x2, 0x88) r46 = syz_open_dev$sg(&(0x7f0000002400)='/dev/sg#\x00', 0x9, 0x40000) r47 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000002440)='/dev/dlm-control\x00', 0x0, 0x0) r48 = epoll_create1(0x80000) r49 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000002480)='/proc/capi/capi20\x00', 0x0, 0x0) r50 = openat$cgroup_type(0xffffffffffffff9c, &(0x7f00000024c0)='cgroup.type\x00', 0x2, 0x0) r51 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002500)='/dev/cachefiles\x00', 0x40040, 0x0) r52 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002540)='/dev/ppp\x00', 0x800, 0x0) r53 = perf_event_open(&(0x7f0000002580)={0x3, 0x70, 0xffffffff, 0x8000, 0xe, 0x5, 0x0, 0x7, 0x4400, 0x0, 0x2, 0x7fff, 0x2, 0x81, 0x7ecc6ff8, 0x7, 0x3, 0x0, 0x4, 0x3, 0x8, 0x3, 0x8001, 0x9, 0x7b, 0x1, 0x0, 0xfd, 0x5, 0x0, 0x1c0000000, 0x401, 0x4, 0x100000000, 0x3, 0xb5a9, 0xfffffffffffffffa, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x10000, 0x604}, 0x0, 0x5, 0x8, 0x8, 0x6, 0x1, 0xfffffffffffffff7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) r54 = syz_open_dev$evdev(&(0x7f0000002600)='/dev/input/event#\x00', 0x2, 0x400000) r55 = getpid() stat(&(0x7f0000002940)='./file0\x00', &(0x7f0000002980)={0x0, 0x0, 0x0, 0x0, 0x0}) r57 = getgid() r58 = fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffff9c, &(0x7f0000002a00)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a80)={0x0, 0x0, 0x0}, &(0x7f0000002ac0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002b40)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1c, &(0x7f0000002b00)='posix_acl_accessGPL:ppp0em0\x00'}, 0x30) lstat(&(0x7f0000002b80)='./file0\x00', &(0x7f0000002bc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000002c40), &(0x7f0000002c80)=0x0, &(0x7f0000002cc0)) r64 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000002d00), 0x800) r65 = socket$packet(0x11, 0x3, 0x300) r66 = eventfd(0x20) r67 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/kvm\x00', 0x40000, 0x0) r68 = openat$uinput(0xffffffffffffff9c, &(0x7f0000002e00)='/dev/uinput\x00', 0x802, 0x0) r69 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000002e40)='/dev/hwrng\x00', 0x2, 0x0) r70 = accept4$llc(0xffffffffffffff9c, &(0x7f0000002e80)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000002ec0)=0x10, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002f00)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002f40)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f0000003040)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000003080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003100)={0x0}, &(0x7f0000003140)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003180)={0x0, 0x0}, &(0x7f00000031c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000003200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r77 = syz_open_dev$rtc(&(0x7f0000003280)='/dev/rtc#\x00', 0xffffffff, 0x46a402) r78 = openat$vcs(0xffffffffffffff9c, &(0x7f00000032c0)='/dev/vcs\x00', 0x2000, 0x0) r79 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000003300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000003340)={0xffffffffffffffff}) r81 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000003380)='/dev/video2\x00', 0x2, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000033c0)={0x0, 0x0, 0xffffffffffffff9c}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000003400)={0x7f, 0xa, 0x4, 0x4000, {0x0, 0x7530}, {0x5, 0xb, 0x79, 0x3, 0xfe5e, 0x515f, '\vBs#'}, 0xfffffffffffffff8, 0x5, @fd=0xffffffffffffff9c, 0x4}) r84 = openat$tun(0xffffffffffffff9c, &(0x7f0000003480)='/dev/net/tun\x00', 0x2c0400, 0x0) r85 = socket$isdn_base(0x22, 0x3, 0x0) r86 = syz_open_dev$admmidi(&(0x7f0000004880)='/dev/admmidi#\x00', 0x3f, 0x2) r87 = syz_open_dev$sndseq(&(0x7f00000048c0)='/dev/snd/seq\x00', 0x0, 0x2) r88 = socket$inet_smc(0x2b, 0x1, 0x0) r89 = syz_init_net_socket$x25(0x9, 0x5, 0x0) pipe2(&(0x7f0000004900)={0xffffffffffffffff}, 0x0) r91 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x3, 0x2000c1) r92 = openat$audio(0xffffffffffffff9c, &(0x7f0000004980)='/dev/audio\x00', 0x200000, 0x0) r93 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000049c0)='/dev/video36\x00', 0x2, 0x0) r94 = socket$nl_route(0x10, 0x3, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004a00)={0x0, 0x0}) r96 = geteuid() lstat(&(0x7f0000004a40)='./file0\x00', &(0x7f0000004a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r98 = getpgrp(0x0) getresuid(&(0x7f0000004b00), &(0x7f0000004b40)=0x0, &(0x7f0000004b80)) fstat(0xffffffffffffffff, &(0x7f0000004bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r101 = accept4$tipc(0xffffffffffffff9c, &(0x7f0000004c40), &(0x7f0000004c80)=0x10, 0x80000) r102 = perf_event_open(&(0x7f0000004cc0)={0x1, 0x70, 0x3, 0x1ff, 0x2, 0x6, 0x0, 0x8, 0x4, 0x2, 0x7, 0x100000001, 0x4, 0xffffffffffffffff, 0x7, 0x80, 0x81, 0x7, 0x7, 0x10000, 0xeea, 0x9, 0xdb4, 0x3, 0xffffffffffff0001, 0x80, 0x7, 0x0, 0x8650, 0x8000, 0x80000000, 0x8, 0x3, 0x80, 0x9, 0x7fff, 0x7fff, 0x8, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0x63f}, 0x200, 0xf1, 0x7, 0x0, 0xffff, 0x3f, 0xfffffffffffffffb}, 0x0, 0x1, 0xffffffffffffff9c, 0x3) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000004d40)={0xffffffffffffffff}) r104 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000004d80)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r105 = bpf$PROG_LOAD(0x5, &(0x7f0000004ec0)={0x6, 0x4, &(0x7f0000004dc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x5}, [@jmp={0x5, 0x6, 0xc, 0x4, 0x5, 0x10, 0x10}]}, &(0x7f0000004e00)='syzkaller\x00', 0x3, 0x70, &(0x7f0000004e40)=""/112, 0x41f00, 0x1}, 0x48) r106 = dup(0xffffffffffffffff) r107 = syz_open_dev$sndtimer(&(0x7f0000004f40)='/dev/snd/timer\x00', 0x0, 0x400001) r108 = accept$packet(0xffffffffffffffff, &(0x7f0000004f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004fc0)=0x14) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005000)=0x0) stat(&(0x7f0000005040)='./file0\x00', &(0x7f0000005080)={0x0, 0x0, 0x0, 0x0, 0x0}) r111 = getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000005100)=0x0) r113 = geteuid() r114 = getgid() r115 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r116 = socket$netlink(0x10, 0x3, 0x0) r117 = openat$rtc(0xffffffffffffff9c, &(0x7f00000073c0)='/dev/rtc0\x00', 0x0, 0x0) r118 = accept4$tipc(0xffffffffffffff9c, &(0x7f0000007400)=@id, &(0x7f0000007440)=0x10, 0x800) r119 = fcntl$getown(0xffffffffffffffff, 0x9) r120 = getuid() fstat(0xffffffffffffffff, &(0x7f0000007480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r122 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000007940)='/dev/qat_adf_ctl\x00', 0x4002, 0x0) r123 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000007980)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r124 = socket$can_raw(0x1d, 0x3, 0x1) r125 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000079c0)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) r126 = syz_open_dev$ndb(&(0x7f0000007a00)='/dev/nbd#\x00', 0x0, 0x30c01) r127 = syz_open_dev$usbmon(&(0x7f0000007a40)='/dev/usbmon#\x00', 0x62, 0x800) r128 = memfd_create(&(0x7f0000007a80)='\x00', 0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000007ac0)=0x0) r130 = getuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000007b00)={0x0, 0x0, 0x0}, &(0x7f0000007b40)=0xc) r132 = creat(&(0x7f0000007b80)='./file0\x00', 0x40) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000007bc0)={0xffffffffffffff9c}) r134 = openat$null(0xffffffffffffff9c, &(0x7f0000007c00)='/dev/null\x00', 0x100, 0x0) r135 = openat$vfio(0xffffffffffffff9c, &(0x7f0000007c40)='/dev/vfio/vfio\x00', 0x802, 0x0) r136 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000007c80)='/dev/vhost-vsock\x00', 0x2, 0x0) r137 = openat$vsock(0xffffffffffffff9c, &(0x7f0000007cc0)='/dev/vsock\x00', 0x800, 0x0) r138 = fanotify_init(0x40, 0x1000) r139 = openat$vcs(0xffffffffffffff9c, &(0x7f0000007d00)='/dev/vcs\x00', 0x22000, 0x0) r140 = accept4$llc(0xffffffffffffffff, &(0x7f0000007e00), &(0x7f0000007e40)=0x10, 0x80000) r141 = gettid() r142 = geteuid() r143 = getgid() r144 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000008040)='cpuset.memory_pressure\x00', 0x0, 0x0) r145 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000008080)) r146 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r147 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000080c0)={0x0, 0x80000, 0xffffffffffffffff}) r149 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000008100)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r150 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000008140)='net/fib_triestat\x00') r151 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000008180)='/dev/video0\x00', 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000081c0)=0x0) stat(&(0x7f0000008200)='./file0\x00', &(0x7f0000008240)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000082c0)='./file0\x00', &(0x7f0000008300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r155 = socket$bt_cmtp(0x1f, 0x3, 0x5) r156 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000008380)='/dev/video0\x00', 0x2, 0x0) sendmmsg$unix(r0, &(0x7f0000008480)=[{&(0x7f0000000140)=@file={0x1, './file0/file0\x00'}, 0x6e, &(0x7f0000000440)=[{&(0x7f00000001c0)="acf6374e2a5196779fc47cb3413a806c2fe79fc783a548abce0cb9a3725c29e43f742e5388076aefa18069077eeebd650fa2740be814740c701fa747141b4e3716bd63237721cf5b689b2a22d9fc260ba3f9b9e0aca3c4e796ff1dc984ecaa98f15521ba403b64569791de58b9d675fe161bfd973127b33937237a9c260f37a17f6651fa747aaeea47353bd46060d4103ff02cae", 0x94}, {&(0x7f0000000280)="7b4b4b4f25a3bb0f2c867bcf1e8bf0b186b6f282c483254dd43c4634f81fe6a7c5270b369567357ba0ba4835f412be37921164319d324e06557ab3ed26", 0x3d}, {&(0x7f00000002c0)="0e8ae34b9ab9f174de88def107d558592e60042d4c518db57a6fd5741f33eff011ce87807330dc361006495417898817d5ea12e111b1da6f73714cf09866b69ad6168abe9918cae90bfc5538ddf470170c1f055bfb2580e8de2e0d85d442e6d4607f1074ef5ea518cff6e96108ea3172efd0c4fd1b425559510e33cda55999879fcf4f963772c69715ede1a51b5f2d03ae80281d79b28fa27f83845d5e75cb9711782dfa3a509794044011818c2903619f13f31423078e41f08d6567e81235b1536866de2f2cf63ef61f0103440c9b9270d0901e6f4084bb20653464063f3f570db9850b6e0426e143527d6f6013d5e572aa", 0xf2}, {&(0x7f00000003c0)="365988fa87414ce265b62f7d52d9df3b6a90e473e4c5d3b38e0ac22c5b2299ff5b1e692ce826ca9baa8e8b", 0x2b}, {&(0x7f0000000400)="9948c3d8de64a01a08d712279844d18bb67b4c25d402fd8c4ad29179fc9382", 0x1f}], 0x5, &(0x7f0000002640)=ANY=[@ANYBLOB="6ead69051fff7f000000000000", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r10, @ANYRES32=r11, @ANYRES32=r12, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r13, @ANYRES32=r14, @ANYRES32=r15, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r16, @ANYRES32=r17, @ANYRES32=r18, @ANYRES32=r19, @ANYBLOB="38000000000000000100000001000000", @ANYRES32=r20, @ANYRES32=r21, @ANYRES32=r22, @ANYRES32=r23, @ANYRES32=r24, @ANYRES32=r25, @ANYRES32=r26, @ANYRES32=r27, @ANYRES32=r28, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r29, @ANYRES32=r30, @ANYRES32=r31, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r32, @ANYRES32=r33, @ANYRES32=r34, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r35, @ANYRES32=r36, @ANYRES32=r37, @ANYRES32=r38, @ANYRES32=r39, @ANYRES32=r40, @ANYBLOB="30000000000000000100000001000000", @ANYRES32=r41, @ANYRES32=r42, @ANYRES32=r43, @ANYRES32=r44, @ANYRES32=r45, @ANYRES32=r46, @ANYRES32=r47, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r48, @ANYRES32=r49, @ANYRES32=r50, @ANYRES32=r51, @ANYRES32=r52, @ANYRES32=r53, @ANYRES32=r54, @ANYBLOB='\x00\x00\x00\x00'], 0x198, 0x4000}, {&(0x7f0000002800)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000002900)=[{&(0x7f0000002880)="b0064038311dd03bff953a2b4338bb287a2a65f3273872fd32c4e229c61da87597be3c687571f65a194fcd61d730a468a2e59df577794299df6e87ef722ea1", 0x3f}, {&(0x7f00000028c0)="3ba4c72d416098e0e8d8e676dcd14ef75156a229b95b0b2bef8fce3026d076", 0x1f}], 0x2, &(0x7f00000034c0)=[@cred={0x20, 0x1, 0x2, r55, r56, r57}, @cred={0x20, 0x1, 0x2, r58, r59, r60}, @cred={0x20, 0x1, 0x2, r61, r62, r63}, @rights={0x30, 0x1, 0x1, [r64, r65, r66, r67, r68, r69, r70]}, @cred={0x20, 0x1, 0x2, r71, r72, r73}, @cred={0x20, 0x1, 0x2, r74, r75, r76}, @rights={0x38, 0x1, 0x1, [r77, r78, r79, r80, r81, r82, r83, r84, r85]}], 0x108, 0x40000}, {&(0x7f0000003600)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000004840)=[{&(0x7f0000003680)="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", 0x1000}, {&(0x7f0000004680)="f7d786d1a047790d0a43b7f40c0d9f554f68cf6f3a5f4255c611a20543d007ddfff0331258562191f133062b6c8724c4fef5e92a51a74547921d55d3e01ffd4a680ac8bf67f2126e64bfadd2eb2aefac87499f91fdefa707130d4218c6c060980207c2c91c22787bc7e1e3d57652fb6d0aea9cb4e11835ac644460c39492581ff3b292a35f14b6", 0x87}, {&(0x7f0000004740)="9c198f85e84994498a3958f70ea11aeab7240edacd46cdcb7da06e09e30f863752c4d7913a0c50cd7bf42382aed8b867834f13c6103c64bef71fa2e430ffb375d8ac02c7bfac18a0aaff0097bacb92f223d8633cab8770efa49605dc419fb3c9da4d20ca05827b8c93ba1dfccde057f3321a90ebe21fc0d2fe06848f20bc08b9ab8d98f3f73cfba21e1bbca4ee5282d934ed6adb441a786545bf7025391f87db4be442499936b3e108340857feaaba69e948dd0d67a4f77d470197619ceeb45de6b6a12f2fc947d7e4749d0f4f0ce7ce87b5852ce4c30b88e6a701daee3bf7917e6da545e7dafc", 0xe7}], 0x3, &(0x7f0000007500)=[@rights={0x38, 0x1, 0x1, [r86, r87, r88, r89, r90, r91, r92, r93, r94]}, @cred={0x20, 0x1, 0x2, r95, r96, r97}, @cred={0x20, 0x1, 0x2, r98, r99, r100}, @rights={0x18, 0x1, 0x1, [r101]}, @rights={0x30, 0x1, 0x1, [r102, r103, r104, r105, r106, r107, r108]}, @cred={0x20, 0x1, 0x2, r109, r110, r111}, @cred={0x20, 0x1, 0x2, r112, r113, r114}, @rights={0x20, 0x1, 0x1, [r115, r116, r117, r118]}, @cred={0x20, 0x1, 0x2, r119, r120, r121}], 0x140, 0x4080}, {&(0x7f0000007640)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000007900)=[{&(0x7f00000076c0)="7d276b1e73fb44bf2f2e10435867e5cf92f37626ea36eab16fdc7d58cb24e32fd5d8d83f76ce6e5ffa67e70f4b1d4893a27db871da475675d54d244e2326b9fa01d446c5b4ba3ff740d688938507c2735d0e2edf2cef3fb7790cd4183c46cc950badb8f852048690c6abc1724cbac15bb61b3474c81cc69579ab3787e93e01937d35be021acf48d148b8c18df250ce427ad5d42a100af9ecf2a14a81e4e7d7ba562f606dc838542bcf965b0137b7638d1ff03ef26459d17299e25265f1986176e30708f5631d4022cb5fc2ffd0300ef8b952e6442bde4d5d23afdfccb5194a1114ada5b508c35f8cf8ea24f5", 0xec}, {&(0x7f00000077c0)="4e1b47aded9d44d889fc28d8cb537450733b70b5da8bf8387a40175e951bf4edb028fabeaeda0d18fc4b3af6f185c6e762448a65dc3e", 0x36}, {&(0x7f0000007800)="a4035e3779267f8f09cff99ba3c7dfcc152dea9cda7af2e9ad2fa8aef10f5a79365a9ae6b91dc5d92154552d65f622bfec012008fee7640da08deca0e7cbad6ef002770b597dbe378e0008226d412c2f589d20280d7962b67cbd7678e96309e087e1bd07b306788f4b99b7b2dc0705f9e94caab3d303fb9f6d5b4516bfc74c5e605bd725334f791d2c5d421503f9abdb986dc6", 0x93}, {&(0x7f00000078c0)="5d432004506f517d4317dcbb6e04f26ca3143fa3f06d1e0e86df564fecef6dd76f0a912beb4e8b6d4304edbc2eb8d78b", 0x30}], 0x4, &(0x7f0000007e80)=[@rights={0x30, 0x1, 0x1, [r122, r123, r124, r125, r126, r127, r128]}, @cred={0x20, 0x1, 0x2, r129, r130, r131}, @rights={0x38, 0x1, 0x1, [r132, r133, r134, r135, r136, r137, r138, r139, r140]}], 0x88, 0x4000}, {&(0x7f0000007f40)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000008000)=[{&(0x7f0000007fc0)="8b1712bcc214425843f4ff214afea60b3d67e0cf9818dcde40", 0x19}], 0x1, &(0x7f00000083c0)=[@cred={0x20, 0x1, 0x2, r141, r142, r143}, @rights={0x20, 0x1, 0x1, [r144, r145, r146]}, @rights={0x18, 0x1, 0x1, [r147]}, @rights={0x20, 0x1, 0x1, [r148, r149, r150, r151]}, @cred={0x20, 0x1, 0x2, r152, r153, r154}, @rights={0x18, 0x1, 0x1, [r155, r156]}], 0xb0, 0x800}], 0x5, 0x4000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000001a40)=ANY=[@ANYBLOB="636f60240980650e689179bf0a4deb7b6d6d69743d30786666666620a9a5d569afccb6630902e347d0a8b65481dc87e538ebba34dce320601ab90f39c993e9fff34622ceb9bfc3628edbeb47f07ade171fa318e7993c223cb26d6fc8e240cc902a37ff85d406c3d747b9e210a782ed8dc7a908d1d6cd62b082124260c91b42cbb0e23cdc8745247c15c3a6e3b9907d5d716119cc72b1944f59d32f097e643c2ee8736be150e60e8e8197776aadbb0c1a1ff3"]) 23:07:11 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extr%_isize'}}, {@commit={'commit'}}]}) [ 458.521889] protocol 88fb is buggy, dev hsr_slave_0 [ 458.527055] protocol 88fb is buggy, dev hsr_slave_1 23:07:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps_rollup\x00') mlockall(0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(r0, &(0x7f00000000c0)=[{0x0}], 0x1) 23:07:12 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x223c0200, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:12 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', 0x0, 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x4000, 0x1ad) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) 23:07:12 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:12 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) [ 458.654409] EXT4-fs: 15 callbacks suppressed [ 458.654447] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr%_isize=0x0000000000000000" or missing value [ 458.655247] audit: type=1804 audit(1547680032.096:43): pid=26856 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir763288595/syzkaller.806c2K/910/file0" dev="sda1" ino=18146 res=1 23:07:12 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) time(&(0x7f00000001c0)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x400000, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4068aea3, &(0x7f0000000040)={0x7b, 0x0, [0x584, 0x8, 0x20, 0x9]}) 23:07:12 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extrv_isize'}}, {@commit={'commit'}}]}) [ 458.751630] audit: type=1804 audit(1547680032.146:44): pid=26856 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir763288595/syzkaller.806c2K/910/file0" dev="sda1" ino=18146 res=1 [ 458.800603] audit: type=1804 audit(1547680032.146:45): pid=26861 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir763288595/syzkaller.806c2K/910/file0" dev="sda1" ino=18146 res=1 23:07:12 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) [ 459.001845] protocol 88fb is buggy, dev hsr_slave_0 [ 459.006970] protocol 88fb is buggy, dev hsr_slave_1 [ 459.019146] EXT4-fs (sda1): Unrecognized mount option "co`$ €eh‘yż [ 459.019146] Më{mmit=0xffff ©ĄŐiŻĚ¶c ăGШ¶T܇ĺ8ëş4Üă `ą9É“é˙óF"ÎążĂbŽŰëGđzŢŁç™<"<˛moČâ@Ě*7˙…ÔĂ×Gąâ§‚íŤÇ©ŃÖÍb°‚B`ÉBË°â<܇E$|æăą}]qaĚr±”OYÓ/ ~d<.čskáP掗wj­» ó" or missing value [ 459.105530] EXT4-fs (sda1): Unrecognized mount option "debug_want_extrv_isize=0x0000000000000000" or missing value 23:07:12 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) fstat(r0, &(0x7f0000000000)) 23:07:12 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:12 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 23:07:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f00000002c0)=ANY=[@ANYBLOB="636f6d6d69743d303844666666090100000000000070093dbe46dbc553f89f786e5122bd12c8439acbde3d00268ea254732646ce6249625e35e7dd186d1c9e1187303bfc728646599689227f968213426d4eee0491"]) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) bind(r0, &(0x7f0000000340)=@pptp={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x23}}}, 0x80) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000200)=0x4000, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) ptrace$peekuser(0x3, r2, 0x9) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='romfs\x00', 0x2000, &(0x7f0000000240)='\x00') 23:07:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra\nisize'}}, {@commit={'commit'}}]}) 23:07:13 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:13 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4ffffff, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:13 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) bind$pptp(r1, &(0x7f0000000040)={0x18, 0x2, {0x3, @multicast2}}, 0x1e) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 459.549573] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra [ 459.549573] isize=0x0000000000000000" or missing value 23:07:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="bf16000000000000b707000001000000507000000000e0ff20000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r0, 0x0, 0x12, 0x0, &(0x7f0000000d80)="5010e88e394ecec9d0ca217ed8cb6ea088ac", 0x0}, 0x28) [ 459.637732] EXT4-fs (sda1): Unrecognized mount option "commit=08Dfff " or missing value [ 459.693336] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra [ 459.693336] isize=0x0000000000000000" or missing value 23:07:13 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', 0x0, 0x0, 0x0) socketpair(0xe, 0x6, 0x400, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000080)=0x1, &(0x7f0000000100)=0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='rose0\x00', 0x10) 23:07:13 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:13 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) [ 459.762999] EXT4-fs (sda1): Unrecognized mount option "commit=08Dfff " or missing value 23:07:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f00000004c0)={[{@data_err_ignore='data_err=ignore'}, {@init_itable_val={'init_itable'}}]}) 23:07:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extravisize'}}, {@commit={'commit'}}]}) 23:07:13 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x3) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x501080, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f00000001c0)=""/200) 23:07:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001005, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0xfffffffffffffd42, 0x0, 0x100020, &(0x7f0000000180)={[{@barrier_val={'barrier', 0x3d, 0x3}}]}) 23:07:13 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff010000, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 460.038247] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,init_itable=0x0000000000000000, 23:07:13 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x6, 0x400000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x111}}, 0x20) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x80) fsetxattr$security_capability(r1, &(0x7f0000000180)='security.capability\x00', 0x0, 0x1a4, 0x3) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000100)) 23:07:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) faccessat(r0, &(0x7f0000000140)='./file0\x00', 0x2, 0x1000) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) [ 460.132363] EXT4-fs (sda1): Unrecognized mount option "debug_want_extravisize=0x0000000000000000" or missing value [ 460.185473] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,init_itable=0x0000000000000000, 23:07:13 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f0000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:13 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) 23:07:13 executing program 3: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x27a, 0x100) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 23:07:13 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:14 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_\nsize'}}, {@commit={'commit'}}]}) 23:07:14 executing program 3: r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x27a, 0x2000000e) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getpeername(r1, &(0x7f0000000000)=@rc, &(0x7f0000000080)=0x80) 23:07:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000a40)={@empty, 0x0}, &(0x7f0000000a80)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000ac0)={r1, 0x1, 0x6}, 0x10) syz_genetlink_get_family_id$tipc(0x0) syz_open_procfs(0x0, 0x0) io_setup(0x2, &(0x7f0000000800)=0x0) io_submit(r2, 0x1, &(0x7f00000009c0)=[&(0x7f0000000980)={0x0, 0x0, 0x0, 0x5, 0x613, 0xffffffffffffffff, &(0x7f0000000900), 0x0, 0x9, 0x0, 0x0, r0}]) 23:07:14 executing program 1: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) 23:07:14 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff4, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:14 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) 23:07:14 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000014c0)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f00000015c0)=0xe8) stat(&(0x7f00000049c0)='./file0\x00', &(0x7f0000004a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000004980)='./file1\x00', 0x0, 0xb81002, &(0x7f0000004dc0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c63616368654eff3331ed3d6e6f6e652c64666c3c0000003d", @ANYRESHEX=r4, @ANYBLOB=',noextend,cache=loose,uid=', @ANYRESDEC=r3, @ANYBLOB="2c6d61736b3d4d41595f57524954452c736d61636b6673726f6f743d656d316367726f7570402c9273797374656d47504c73797374656d2d47504c2c66756e633d4b455845435f494e495452414d46535f434845434b2c00"]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001600)={0x0, 0x0, 0x0}, &(0x7f0000001640)=0xc) ioctl$VIDIOC_G_ENC_INDEX(r0, 0x8818564c, &(0x7f0000004140)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001680)=0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x6) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in6, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000017c0)=0xe8) getgroups(0x5, &(0x7f0000001800)=[0x0, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0x0]) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000004000)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e21, 0x0, 0x4e21, 0x80000000, 0x2, 0x20, 0xa0, 0x84, r8, r5}, {0x3ff, 0x2, 0x401, 0x4, 0x1, 0x41, 0x3a9, 0xdc3}, {0x8, 0x4, 0x5, 0xffffffff}, 0x1000, 0x6e6bb5, 0x1, 0x1, 0x0, 0x1}, {{@in=@multicast1, 0x4d3, 0x2b}, 0xa, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x34ff, 0x1, 0x0, 0x8, 0x401, 0x401, 0x7ff}}, 0xe8) r11 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001840)='/dev/cuse\x00', 0x2, 0x0) r12 = syz_open_dev$sndseq(&(0x7f0000001880)='/dev/snd/seq\x00', 0x0, 0xc880) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000004100)) r13 = syz_open_dev$dspn(&(0x7f00000018c0)='/dev/dsp#\x00', 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000001900)='vfat\x00', &(0x7f0000001940)='./file0/file0\x00', 0x100, 0x1, &(0x7f0000003e80)=[{&(0x7f0000002e80)="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", 0x1000, 0x7}], 0x1000020, &(0x7f0000003ec0)={[{@shortname_lower='shortname=lower'}, {@shortname_lower='shortname=lower'}, {@numtail='nonumtail=0'}, {@utf8='utf8=1'}, {@iocharset={'iocharset', 0x3d, 'none'}}, {@shortname_mixed='shortname=mixed'}], [{@fsuuid={'fsuuid', 0x3d, {[0x62, 0x0, 0x38, 0x65, 0x75, 0x7b, 0x64, 0x7f], 0x2d, [0x570c38545036b15e, 0x62, 0x36], 0x2d, [0x77, 0x3d, 0x0, 0x77], 0x2d, [0x67, 0x7d, 0x3c, 0x32], 0x2d, [0x37, 0x64, 0x64, 0x0, 0x7f, 0x30]}}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@euid_eq={'euid', 0x3d, r9}}, {@subj_user={'subj_user', 0x3d, '.trusted?((-#-(]user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x77, 0x31, 0x65, 0x33, 0x73, 0x39, 0x63], 0x2d, [0x0, 0x64, 0x32, 0x77], 0x2d, [0x63, 0x37, 0x33, 0x34], 0x2d, [0x76, 0x31, 0x77, 0x30], 0x2d, [0x65, 0x66, 0x73, 0x38, 0x38, 0x66, 0x77, 0x63]}}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/cuse\x00'}}, {@fsname={'fsname', 0x3d, 'ppp0'}}]}) r14 = socket$caif_stream(0x25, 0x1, 0x2) io_setup(0x68c, &(0x7f0000004b80)=0x0) clock_gettime(0x0, &(0x7f0000004cc0)={0x0, 0x0}) io_pgetevents(r15, 0x4, 0x7, &(0x7f0000004bc0)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000004d00)={r16, r17+30000000}, &(0x7f0000004d80)={&(0x7f0000004d40)={0x9}, 0x8}) sendmmsg$unix(r0, &(0x7f0000002d80)=[{&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f00000001c0)="0a238db8625bd9ef6281f98f20d6f4224fdea89bc9482ec2d3fe45f801825400ba212187a95c63acf0dab7623da88103a09cdcd0ab79fdce21b5da89a6ea717d235fa2d23581b234312ed122f4a9ba236c5ecb01b19d3fb1375a31dd5a8507501673c1a4af9045d2addef3c219973eb8380766a0c987334cf9b11c03a9326f393e4cd361d484cb404065737d9674ac806c25bcd10cf507b5", 0x98}, {&(0x7f0000000280)="34571171639f90700ad9f2c37082ccef880b6cc8e8ea3271bde2a9646fd9981c1bbe8dd0e212ac2b62c93b858652ec71973ef0d87ff01acceb61f5fbacc8356ed2704a6b1208f562d4173ba9a9aa72f4c0d3f79386c405c668d67843ceb9d1a00f820af5bcd31ef2621395fe70aaf7ded3f9fbbaf4fade8e179438265d855df482602b4970cd6324dbc2eb6e4b773bd592086af78278c8137d52dc65df7b7ed5a56c74ef314523844ae88b44e65b8b9f9e58be8ea1199473978b043a8e59579fdb60b2ef95e8bf566b7920ef616f4a237577266345503d0263f823b78ca0102756", 0xe1}, {&(0x7f0000000380)="1bd0a62304b251b76e486c38635d3fbb92b8d4cee6a440d3b944d12fe5c3340c0388978fa02eae85dffab892bd34d65117c2c7ab09b50c1f856ee62a037b08a31fcc78ba9827126049dbfb057204b2a6a0a0b0dacc7378fe8d886d6819d00dc8ade2eef8b874b221cca689219ef2eedb6c027b57e9e9cdb05b793fa174307e", 0x7f}, {&(0x7f0000000400)="f88650ffb50eafd20685f477fc7acecb7c6d1118d5de0ee94ebb49106cc87b0343e6cec6fe827c3967326d0bb3db119e5ec588e8c786eb98e1", 0x39}, {&(0x7f0000000440)="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", 0x1000}], 0x5, &(0x7f0000002e00)=ANY=[@ANYBLOB="20000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r6, @ANYBLOB="00000000200095adcfae84d2d60000000000000100000002000000", @ANYRES32=r7, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r11, @ANYRES32=r12, @ANYRES32=r13, @ANYBLOB='\x00\x00\x00\x00'], 0x60, 0x10}, {&(0x7f0000001980)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000002cc0)=[{&(0x7f0000001a00)="a798e25057fefb0d33a1a0ab9fabe8ac55f567003dcbda2aa8be", 0x1a}, {&(0x7f0000001a40)="d3a6e50cccab620876779bcffdba524498859ce3ef3d5a1f3191e1fadb6a39a24b052cf6", 0x24}, {&(0x7f0000001a80)="8f468234e2b7b54a71b7fae645ebf2734839ea52a2c7b3f82ba939dbba41d575e55e7d564b3aa3e7c9fb453b0c29c81645b5fdb3b8dc47cd5c3b", 0x3a}, {&(0x7f0000001ac0)="ec7c9f50cbb6504a7a920306f355423686223302ef429f798edae0c13aed4e22f35d13975ea839b9ac899f65", 0x2c}, {&(0x7f0000001b00)="ccfb195f101fab8c08e3cbb8884de5889e8602710953773cfdeff9ff450b234c946c1bd48e0bb0e7acab6daeeb2372d297b713df2bd7db930dd9b783f665d4a99c341b88c8d6c2b3ca25d80551cebdd2dcfab7583d5fbed74397ae1b277978d96234db2032034e0ed70739d21fb50da5fd84339c499e293c8d1d4aa4bdb90c0ff8caf505dcbced52e2f12b7506e368cec0ff156faa319f4a07ad27e0175f2cbe422b4e7d5d70", 0xa6}, {&(0x7f0000001bc0)="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", 0x1000}, {&(0x7f0000002bc0)="c49896f6528e47489254b51146c08754cf34a4c21924567f90b46d048c08599b6db6c147e6247652e6b3ccc9c5b3c1bdd42a8bfebdc0fe4d10fc7b2d8715c43e97c9edfb316076d9dad626d5655b72a8a79701076f19b955d6c81210e7b02b8e747f4b720a84deedf2f81febd56544224cee2dbc20ecf8c3d417e52ffd2fd0bc66db58eb58850ea4c1ca821a71e5ce5a56096a19ebae2f998f49e78b7e596422ec9ef11965108d6c23d4892f18df6197c77653340c99c00955c3ba4f1ddad5b34cb480246e5280dff0e5c8e589b21370030825a5", 0xd4}], 0x7, &(0x7f0000002d40)=ANY=[@ANYBLOB="180000000000007492deb8bf49e67c0f", @ANYRES32=r14, @ANYBLOB='\x00\x00\x00\x00'], 0x18, 0x4040800}], 0x2, 0x20000000) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) 23:07:14 executing program 0: 23:07:14 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:14 executing program 3: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000040)=0x1) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/211, 0xd3}, {&(0x7f00000002c0)=""/182, 0xb6}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x3, 0x26) fsetxattr$security_capability(r1, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 23:07:15 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_vsize'}}, {@commit={'commit'}}]}) 23:07:15 executing program 0: 23:07:15 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) r1 = dup2(r0, r0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000080)={'veth1_to_bridge\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}}) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000040)={r2, 0x2}) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 23:07:15 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800800000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:15 executing program 0: 23:07:15 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x2000, 0x100) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000040)=0x80000000, 0x4) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 23:07:15 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 462.301468] audit: type=1804 audit(1547680035.736:46): pid=27102 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir763288595/syzkaller.806c2K/922/file0" dev="sda1" ino=18177 res=1 [ 462.414639] audit: type=1804 audit(1547680035.786:47): pid=27102 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir763288595/syzkaller.806c2K/922/file0" dev="sda1" ino=18177 res=1 23:07:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB="796f6d6d696e073e552147bd88942476f39a02e1743db066666666"]) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x40, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f0000000140)) 23:07:16 executing program 0: 23:07:16 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x20000, 0x0) ioctl$KVM_SET_NESTED_STATE(r1, 0x4080aebf, &(0x7f00000001c0)={0x2, 0x0, 0x2080, {0x3000, 0x4000, 0x3}, [], "7bb65533bfa796482526ae4a89e9997c97cc5bbf3bcae3e324bb16d4d75c8ebf3ac4a762e256996e498805b4a32c6dca303358b582af7b4f3e93375d676c8d9a41908090e9c981830671ff0ca2f3776d2c5a8d9476a2c5b76d173414aa228d361643c1639aa0ca26bbbab2bbeddcaa12e2d472519feaa8ada1b7e772ada2126cafdbe439fca2cf1f4c04fbeafc18d64710a1b910a337e27a6ccdf180444e990553361fda800bdde44b56de609217efc9edf84a693b1c7d0135786afe0e81b21363df1de36f8aae0817606248f4c463f0f82b9266d1b4d75a55e5c50e3e05fa49dab464391034a36ecb3aa4ba61a7db3c1ddb9b7fbe0a277a8da0bc05270ef223241d935cde3de03e6afc237877489b2b559db34a66cb29c2256487debf6d508005b43dbabd8919e41ab329fb6267708c3f199459da49a7bdacb767f751789a4a020594f888a7d967f1cde33ceea339e6c9175fd168f1c1e9f9fdd85fa0b59dcb9340c2bbcb27c253406a64c19eb325b58319e6570ec146dd033855465c908a5c1d7934dbf7cef8c2055a2f85054da40e547c0a1b7858a447d02c1009e23931a0dd85ab242284a886a7de1f7f66818c47bd3359c87d63dea06d02d7a96691d2ce369b233db643bf068e7fdf8d35ed63790a20205dc112403cc396932853a8e9caaee6bd52a0a0c8031c906a928133eefd110b64f195174bdba9ba9221c3b60f4900b96a7098a29ad17a26d07d1ec678c7b51b53d3b544d9a9c8933c9ffc99788b8fd300cb91c4e134fdd51964d26c09001f3543260d3c87812dcd5c422dd956f6af822376b1db990e5072a4f6446f70d9b8d59be5d801b185c2b051f75b9fbfb49d1e4b1e78fe3ae70fa848614839313597eefffe85af0ae70e573e3b1d2d735f7a2a7bc8ada7308f6509ecf973c95aba90762eb78b721d36563cb897f293e8e69fd50cf4e5f9dcaab9d039b3fc5aa65dfb6a1a22c7e73b159edcf3caa1f4b7a38b7e97f468478a995a20bec58610a3b5a3a8edc2275ef160be75f28d30475a1355ef5a1c0090318d40be808f4029eff96b68f6608a831b35d00d10aee11b39413431e6e5fc73fc9732871a2539b37ffd414b23a68d15a4cf49e524dffed1d9dca7d3fec35e644df1092bdb31635f8a70b6223ad180681e3719c3e35869cdb5e4b4836e535ab1aa53bcd188bde9091674d24b01e280d95527ae0d77cb04369295f74c317a22b93f1c82e628c940f6ca14515169b1eaa1c1604b978607cf99b937e9d5a9bd879f93259b3852a1a28eb9b2790e8456115565dc47cc013e710e145dc0256fb65e64d90f033978a63a2b7ab1feffa675e6a6e3d5a8912fd9699a253a9ebd25e5498a3b7c80029d917ec6aa3bbc72d6a5b6af248dd1b0671a55106dc12ed884e4912021f6baeefbf8dad456af8f600ad275a4d702b951c863c972cacc7f178d19e43209c314f08d77306e62f6758dfa6449db136999093181b60c82b5996488d9e94c1c324f29725acc624be4fdc730bfd59fa011889d532fd94c2a38577374db72496c3ac78356658c58cac7f01975046ba58d530d4ef34b74f852172e3dbb9a851aaad04d7f8a96917dfe48b04a20e7bffc6208afbf852462b9815ae8521cfa76cbd5bf3565fb5973d899d86d2dfbb6f90f21c0f2f77a807bf98568359d843631ab63b54eebc245ade1e7cc325c0b48b810e99cbf5431d445f9e017d0491d1f73208ef37df0f378139acfbd299ebbab95547149d3bf3ebbbef1262465383a844de63f8a96bea9dae3b0cbfe375d8f0f56ae5677327285ee8bc2bbf6849c55f0cc514e91d3f305c5be6fcfc537993954012048a89f07bb2f6ce712ee750c8163abd3756d8a58ceb7925ac1255e8627b037dbaddaa841b6a3a22675a1d357e43050072ce1cf092d9458c94696a14ed4ff5e8d7e3c48d8323780c59afef9d6fe7277673dbfdb28742cfff3f6946252e349af29eaf4b6725e89686b59a51baf0d7e4b0cee6c348bf0e984ec29387c22249d639403ef8219be652629bd4e5cdc805667a362dd917ab5638a916e57b4377f050f87d212c3c6b7c77b4076de1964d72e01f82c6b83e81e71cb100e32693afa08c13580da8a04f8c211cdd2b993d25b434b28790c822661e14a77a4a032ea8e4cd9b2c3865797fc1ae8f80d8b23a714ee7330be5ab1ab19c01a0674b9f52b113b96af27f62202cd6e5fe3a96d825d7f83df3c9cc8ab3d9839f61622cf604cb23712d060471df17223c7001bf0fde26ab8d058d167c8a43a9177f8d60401de295ad5280ae632986df6062396c5ae2e67b8316851932dd65062a6e3bc108cf43a474d8bd0d7c80ca92a3981a98ff9eb2bcd96cb5c391e29cc2bebb34f566d4c6fe31dec1d760987bac935af2581acf1fe96e6cfcfca73d87e4abdf1f1ad67d2e0ebfcf5f7702c84c6295cdca89c9570d1041fba5820914d5d49447a882729394b962a6400dc2b090d802a4d6bf684863570d396f4b640865d6c9baba63fe68f8854526ce86c04fca7dcdbcfe0d93db720c0f73d6811711adcaafcd0c440e82fefccfe5dcd7dafe2805ebafa1e4402134a855c25a2a5e7167be0092fa1d20b3d0814d750867088e9f9572a1c3a88079bd1001e515bf705c6cc56d392fe534d8df2c16727d004da4e92c55333ef5aa057cff6ac23b9ddd9385d2b65d5e8cd5fe78368d97911f19ae805bc4ab8d2321c0e57e61ac2f85b2f97c43c84faa70715209c63a843a6057bd4cc6e51615423ae527dbfeb49cded7f371b13937c45c7cf80f05d24640c17a3a610ff1057f0eb846544585239b4d298a0b1c61d53700bee79b9812e09af0f92efd7c6b49d20a4d636b797a318d034671bf2916d5485e819a8239805d68677d0feeb839659f9021b67e5f0f8b54a7ae7b960316d49279411bcbc3048c94f2cd829e158ea72afdda5bf5df0c42ac95165cd544b6fc82c877efd1b0bbaddff2da9e0d88daddbe934a46781543c505d0897e9cb43cecebd6d7296e7aab3e1d8b28f02e1b44ee11e21fa617b65f2258281b0f30facccc7ece485b29265a6d41adce0a6a6bd0e0f436b2ade6b62a57542bc2e3321fbd26c88337ecf466ab77b09164ca1bb8b3c9feaa5ea80d96cbc7aab6fa9b565446728665602d7ad52e7f62f0085ec2d22362941f3f6363922c675f839edf309b6e2cc677ddfbfad91e323107ddf42cbea47c6e26af71a46504d8a43cd385e1ac37904f48df0461ad583c18fdabc21e5284093d532d9173f0968d4a1fa4f4e48a875880660d4fc53e2e5ef2576ffade2bd0e16e6bc04e2c1dceba0e9e07a367225d2739ad917f1558854c506f45a724e7e98dabfb10eb36eeea2af943fb3064d7338531bcfc32dbbd3c125bc61053ec5a613aea8fa249356dee71cf34acc6cacdd8513220651e92d79c3c0a331633052caa7ea0ceff7d037ef8a487902f25c87b0ecb0e24fa933f342b32be5cba5288a4c180df58fce4fd064bc12730fdc18f78f1e3af23732dc4140948c7e86bd3b7ab977568206add1ce5a76a1d40938e31792f71ef6a0db799f129cd7669222f3b0536fb4fe848b37a5c854dc7e3f14a37e4fe5eecef88a937eef93f390bea205cd6c24ce28a2e06e05051e51af0e11d83478a4865aa4b3ca74636e74ec44a15f4e58ff65738bc61954a61b9ac2be17b07400107f21d535be63efe59ab07bd051fc27c3f317700fcf88f8a125f96e0f4d04bbd31ec2d859314c74c52926643d9e8ae3cc32563736a91eb4890ba0a41a667033f03a43b9b7e0c39fa83748cc73adc5975035f1c7c6aed9f1a38c1109ffb77bc193d3718aec12dbf1cd8a7622e2cae9348cd5e487b62a872f9310347db4716c591bd57a6825b5fa834694c40312bdcd46703d5cec99ad423466160e2f7acde84681633b08b84037742e917db4b0dfa026a23b8a217f46dc4488df9395c644ee82c0f7e77d54d1a15c445ef2cbe1d02ebaefcf94b87964ff3a6a3f623973084935948a252a7a8dc1edfb4e5134fb3efa6ba1e67a50dbeced3ad966aeda38aa16302567e2534a73ab38c92c17a100e29bbbc6f3e918ef7c0eb07a2968e8daeb14762bb78008b62aa40cba3000b68ff576454fa9509cef993bb448672476b38646ff6cd3932b338a8b04a3ae829f51fd237e49d6f6489c78bcaf3f9218c203e5d2980aea0e08b81b362eb6aa806c7c4e36149b52857f3e5b017ea161c92929303e2288a7a5a8b472fe485550723abb79177f08c3cf9efb7c94e2a03ade916fbf9b53599343add6c62605f40948715fcc978f318d5332d8f030c2bda8936f1137908dd6848b335472898f706eaa39be5091068fb587b6cd24365d6fb76ecfe3d95f4df5e207c694baa594c7e9c52075eec1c18c1791d3fc48e8378ecf578a1812d1f28a988755c97bff891140f9d0cde8fd86e524ec6e8af03bff14486c2c447f3180aa94ec74ab6e6ca2a40ae70aeea7583845535a6177bc2fc35e693f118ec46d1bcca94e036664fdaa2835abc5d501de4664e05f59448830a79f656d994fc6fd34fd6bac2b07ff68a249f00ee814ff0c968b225a1ed84114d853b01890ba800a0a335e2adeb18acfc7a7c8c506c7b3130b55dededc51d3268754f5f48ca02cac07b94b7d877ebf1b3d19e906513e3456eb884a5a095cafb8ca9206134729db8e2a63a2183f45b4e2fd4c33cb7639fb6c1c62bb0b415ddca21ca0a4eb5eaa2aa9acdc091dad6cc7a87df133ba808db01fd08a51cfa073d7ef0baad5183fed5d354325c71f4a1433bd17c90b84076ab839742e14b9069ca6c08769a5d5bf15bb6bbd7ecda2403f2c4d805e06134efd733a214f3e4d65d8aba8d6e207445b1237dcedc36a7ed5ef38a92b12af9e3a5089300f0146f92af0549fd611d60fe46fec3104ad4733a9cdefc0fad4b6066e7bea81c427e6849ca715b0e3cbb2d8e8d42876384d0b2a11487c4ece085366a88530c659b383fa1a78ed3e182ecb3e788c0eb280dfe80a1266ddd7ca36d695468ac4aaf6deaf9419003b6e5bd032ab093711cc61d59752132592dd6e7513728f9560ef297de822569b4632835e165cf4a6781ef4c40864c0b45b25f76d12dfa7d8c1aab16faba8192901aa49b7d0c52a4028047863ceffa5679adde315f347770c85ed66d078f9f73a44f67abf5c7a963efa4510f8b9470e78263631f613de9410a6c2fa7305846f657689bc37ccd5f7275cc02f035704e2207d4070bfa827b949d4f96904543e7a1dd77038fb693ab64d227bbaa7889cc3a5f0deb0160aa7dccc6c72172999b5be9909efd54240e34bedad6a2c59145b300a14b855eeb3bcc6902c61bb8ba86ca1ce7840ac384765f56df34b92020187617e7597674dd99014796b5417603e424e9a96847630a36fe50c88f8a7618bdb9b1869ddb84bde1abf0944a7578330b62b543a6b311f8da32d109f6a2288a7c7d4e06a0dda4b241c24a7ba8473d3a2e5b693dbe279ed619f7fd385c963fdec3327d8453ec432be22035e97138cc3bed85b541f656fea283b71529ab05109e9b83fab1c4143ae8ad3b491ab17a8cc04fba5ea1b42d6d5e17188bfba529e0490b2f0370df47bf0f24c63a8462d4a81d2f878b90f89eb45d7e815177f181e30239f52aedbee39438071a56e8796a9ce618f386a66784756eccabc983729f1e5cbdaf5eae6894ddb568ee0be28cfba6aa67933dbb3ea9b5c330ecffe6d192525097d5cd977a4525cd682b57e9d024dd8fc2b78b51d4ba93d5cbe0000ab70025e94e80f3e5a90582d3711ebd08e4d208ee62783", "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"}) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0xfffffffffffffdf6, 0x2) 23:07:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_i\nize'}}, {@commit={'commit'}}]}) 23:07:16 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:16 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:16 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x272, 0x2) 23:07:16 executing program 0: 23:07:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_i#ize'}}, {@commit={'commit'}}]}) 23:07:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x21, &(0x7f0000000180)={[{@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x1f}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0xfffffffffffffffb}}, {@mode={'mode', 0x3d, 0x7ff}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x3}}], [{@pcr={'pcr', 0x3d, 0x10}}]}) mount$bpf(0x20000000, &(0x7f00000002c0)='./file0\x00', 0x0, 0x2000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) 23:07:16 executing program 0: 23:07:16 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x408000, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dlm-monitor\x00', 0x400, 0x0) r0 = socket$isdn_base(0x22, 0x3, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000002c0)={r0}) sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16, @ANYBLOB="100029bd7000fddbdf250b000000540003f814a90600fe80000000000000000000000000000e0800080005000000080007004e240000080007004e20000014000600fe8000000000000000000000000000bb080007004e230000080004001400000008000600020000000800050006000000"], 0x78}, 0x1, 0x0, 0x0, 0x23fe747b3adb7d5d}, 0x44001) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x101000, 0x19) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x7f}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000340)={r4, 0x400, 0x5, 0x1f}, 0x10) 23:07:16 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88000000000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:16 executing program 0: 23:07:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x102) r0 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x5c2, 0x4080) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f00000001c0)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) r1 = open(&(0x7f0000000040)='./file0\x00', 0x800, 0x8) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000140)={0x4, 0xfffffffffffffffe, 0x8, 0x9, 0x14, 0x1, 0x0, 0x1ff, 0xfffffffffffffffc, 0x4, 0x8001, 0x81}) 23:07:17 executing program 0: [ 463.673677] audit: type=1804 audit(1547680037.116:48): pid=27178 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir763288595/syzkaller.806c2K/925/file0" dev="sda1" ino=18178 res=1 [ 463.744704] audit: type=1804 audit(1547680037.146:49): pid=27186 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir763288595/syzkaller.806c2K/925/file0" dev="sda1" ino=18178 res=1 [ 463.855463] audit: type=1804 audit(1547680037.146:50): pid=27187 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir763288595/syzkaller.806c2K/925/file0" dev="sda1" ino=18178 res=1 23:07:17 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_i%ize'}}, {@commit={'commit'}}]}) 23:07:17 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff0f0000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:17 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 23:07:17 executing program 0: 23:07:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x200, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000400)=0x8000, 0x4) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f00000001c0)={0x8}) mount$bpf(0x20000000, &(0x7f00000000c0)='\x00', 0x0, 0x80, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x9, 0x220000) accept4$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000180)=0x1c, 0x80000) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000440)=0x80, 0xfffffffffffffee8) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000200)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {r2, 0x84, "411774", "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"}}, 0x110) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB="636f6d6d69743d3078666666666666b66666666666666666392c00"]) [ 464.411256] EXT4-fs: 9 callbacks suppressed [ 464.422456] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i%ize=0x0000000000000000" or missing value 23:07:17 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x9, 0x20, 0x80, 0x8}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r2}, 0xc) 23:07:17 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:18 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x8100, 0x0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x88000, 0x0) getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f0000000040), &(0x7f0000000140)=0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, r1, 0x0, 0x14, &(0x7f0000000200)='security.capability\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000280)={{{@in=@broadcast, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000000380)=0xe8) fcntl$getownex(r2, 0x10, &(0x7f00000003c0)={0x0, 0x0}) sendmsg$nl_generic(r1, &(0x7f0000000740)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x14200}, 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2e4, 0x1a, 0x10, 0x70bd2c, 0x25dfdbfe, {0x14}, [@nested={0x200, 0x65, [@typed={0x8, 0x3d, @pid=r3}, @typed={0x14, 0x1f, @str='user)#system\x00'}, @generic="f522118aa47490aebcae0d0c3de1019f3666d17c399f40575c8d6b5639d59c3f49f5941f7c72717f0f4661ec21581da440b71ece4d542d277d2d560563519ae5edd2bd721faa917d165281e6b08e971c793db1f4f30e73bc5e946c8ab5cb8e5a0e676f7f0fb1578b7c2a59af6e95d9f4611c57cc1ccb35924165f548dcddfa56963b646edbf9fce376160ce96289a2f54182a381ae73d6fd2021d9f96df5af422846ada2677d1352cf14ee3a8d1a5fc4be41bdd86a7c5620c058e680dbc7da9634b53773f97817712caed0846ffdf70b5fd986bf6c99bd1688fc86a1f11c9b576b8b0bb88563a198e3b1c1fbb73c273a", @generic="2e8cd8", @generic="ccb0abf513225337a6cdf36782d8c4374bc17bf688507bae87a0dfa72f8ad62f1f63becca64aaaa3c79e13dee79fcc22c1bbec675b68ca9dcc882cb8ea9be4e66794cb8b160c90d06b20aca0676c8ddfb6c0340003ac473978e7fde3762fda9b52080a99fc8ed1dfc16baface0a2a4d7992e4aa30de720d69aaa264dda33f58b1cc2ef827dacacbedf61e212db35664a177dddb1430a4f23383ee948d3705e254bc69b5f22e4903fed4c4cd9a51e33d20b534c412551d2285a306d446ca225e4da77ad478564a72520d6e12abaa17e5a9e7100e6e46e9831225a96d0f065318d75d532d918557d1c4c209bac"]}, @typed={0xc, 0x62, @u64=0x3}, @nested={0x24, 0x31, [@typed={0x8, 0x7e, @uid=r4}, @typed={0x4, 0x4}, @typed={0xc, 0x26, @u64=0x3f}, @typed={0x8, 0x7d, @pid=r5}]}, @generic="c9476b4c2c1ee947ec7f1ff18328486ea959672d93f4a2694a028c717424eb89a95f46ec9b9bc437b13da44eed37ff3143ef67203f4c30156ab92698bf5a423ced08e4479f21ed63dcaeae374003b394a11de12f4b28f822e1aa5e94da5087b1a631762af73f5ecef0e2405b4c627dc83e950917d0805f3997da3f1f9cf81f4f3e89e643217ac5c47cecf3ac604ce3e44fe74edde13b05d39690368fccd3db48"]}, 0x2e4}, 0x1, 0x0, 0x0, 0x1}, 0x48880) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f0000000100)={0x0, @aes128, 0x0, "5250242739de1819"}) [ 464.589492] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i%ize=0x0000000000000000" or missing value 23:07:18 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_i*ize'}}, {@commit={'commit'}}]}) 23:07:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB="636f6d6d69743d307866cf88666666666666666666666666392c00"]) [ 464.998727] EXT4-fs (sda1): Unrecognized mount option "commit=0xfĎffffffffffff9" or missing value [ 465.052044] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i*ize=0x0000000000000000" or missing value [ 465.154740] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i*ize=0x0000000000000000" or missing value 23:07:18 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:18 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', 0x0, 0x0, 0x1000000000) 23:07:18 executing program 0: r0 = socket(0xa, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_SET_FLAGS(r1, 0xab0a, 0xffffffffffffffff) ioctl$NBD_CLEAR_SOCK(r1, 0xab03) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) 23:07:18 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB="636f6d6d69743d3078666666660600666666666666666666392c00"]) 23:07:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_i+ize'}}, {@commit={'commit'}}]}) 23:07:18 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:18 executing program 3: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 465.394491] EXT4-fs (sda1): Unrecognized mount option "commit=0xffff" or missing value [ 465.472662] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i+ize=0x0000000000000000" or missing value 23:07:18 executing program 3: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x80) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000040)) getdents64(r0, &(0x7f0000000000), 0x0) 23:07:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x100000000, 0x183000) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000140)=0x1) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) [ 465.610880] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i+ize=0x0000000000000000" or missing value 23:07:19 executing program 3: r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x27a, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000100)={0x0, r2, 0x100000000, 0x0, 0x2, 0xffffffffffffff80}) 23:07:19 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 465.674058] audit: type=1804 audit(1547680039.116:51): pid=27302 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir763288595/syzkaller.806c2K/930/file0" dev="sda1" ino=18212 res=1 [ 465.731625] audit: type=1804 audit(1547680039.116:52): pid=27302 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir763288595/syzkaller.806c2K/930/file0" dev="sda1" ino=18212 res=1 [ 465.799798] audit: type=1804 audit(1547680039.116:53): pid=27303 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir763288595/syzkaller.806c2K/930/file0" dev="sda1" ino=18212 res=1 [ 466.129266] block nbd0: Device being setup by another task [ 466.137643] block nbd0: shutting down sockets 23:07:19 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_i-ize'}}, {@commit={'commit'}}]}) 23:07:19 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r0, 0x0, 0xc, &(0x7f0000000100)='selinuxGPL\x12\x00'}, 0x30) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000001c0)={[], 0x1, 0x101, 0x7, 0x7, 0x1ff, r2}) getsockopt$packet_int(r1, 0x107, 0x30642bc323945228, &(0x7f0000000040), &(0x7f0000000080)=0x4) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) fsetxattr$security_capability(r3, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 23:07:19 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:19 executing program 1: lsetxattr$trusted_overlay_opaque(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='trusted.overlay.opaque\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x80000, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8052320}, 0xc, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="20000000d27ae065f7267014e95a74596f77c4dc4599eacd8a61d5c50b658b847bf9bcd889d1a3240cccb0927953aff9aa9283db7c719a63e8", @ANYRES16=r1, @ANYBLOB="df25020000000c008590ba32bead0cce35355f6ce2c1329facbfb48f239c1ad5d482f24b6292ad16c729463900802690027e334812a9c8d3401bbb4764fd1c25c74b44c558421fef6030e3902ca4ba4e98606046"], 0x20}, 0x1, 0x0, 0x0, 0x20000041}, 0x4000014) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) socket$inet6_tcp(0xa, 0x1, 0x0) 23:07:19 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:19 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x445a, 0x20000) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x34, 0x0, &(0x7f0000000040)}) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) pipe(&(0x7f0000000100)) fsetxattr$security_capability(r1, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 23:07:19 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 466.383071] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i-ize=0x0000000000000000" or missing value 23:07:20 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x804000000000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:20 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x8001, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080)={0x4, 0x401, 0x6, 0xfffffffffffffff8, 0x9, 0x4, 0x4e, 0x2, 0x8, 0x100000000, 0xffffffffffffffff}, 0xb) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) [ 466.704560] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i-ize=0x0000000000000000" or missing value 23:07:20 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:20 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_i.ize'}}, {@commit={'commit'}}]}) 23:07:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x404600, 0x102) fchmodat(r0, &(0x7f0000000140)='./file0\x00', 0x101) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) 23:07:20 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:20 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:20 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200000000000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_i0ize'}}, {@commit={'commit'}}]}) 23:07:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x003zw)xmit=0xffffffff']) 23:07:21 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x223c020000000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:21 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:21 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) getpgrp(r0) 23:07:21 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_iXize'}}, {@commit={'commit'}}]}) 23:07:21 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7800000000000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:21 executing program 1: open$dir(&(0x7f0000000040)='./file0\x00', 0x549080, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1084040, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) 23:07:22 executing program 0: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:22 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:22 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:22 executing program 1: delete_module(&(0x7f0000000040)='-C\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) 23:07:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_icize'}}, {@commit={'commit'}}]}) 23:07:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000180)=0xc) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) renameat(r1, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') r2 = fcntl$getown(r1, 0x9) write$FUSE_LK(r1, &(0x7f0000000100)={0x28, 0x0, 0x4, {{0xc03, 0x240000000, 0x2, r2}}}, 0x28) 23:07:22 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4ffffff00000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:22 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}], [], 0xfffffffd}) 23:07:22 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x80, 0x0) renameat2(r0, &(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x45) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) 23:07:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_idize'}}, {@commit={'commit'}}]}) 23:07:22 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:22 executing program 3: socketpair$unix(0x1, 0x100023, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r2, 0x1, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44880}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e22, @broadcast}}, 0x0, 0x8000, 0xfffffffffffffff8, 0x9, 0x10}, &(0x7f0000000440)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000580)={0x7, 0x8000, 0x3f, 0x1, 0x0}, &(0x7f00000005c0)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={r3, 0x10000}, &(0x7f0000000600)=0x8) r5 = gettid() ioprio_set$pid(0x0, r5, 0xe6) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x84000, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={r4, 0x1000}, 0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000400)={0x5a, 0x1, 0x0, 0x6, 0x2, 0x400, 0x4689, 0x0, r4}, 0x20) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x6, 0x2001) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000480)) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) ioctl$PPPIOCGUNIT(r1, 0x80047456, &(0x7f0000000380)) 23:07:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x20000, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000240)=ANY=[@ANYBLOB="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"]) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000100)=0xe8) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r0, &(0x7f0000000480)={0x78, 0x0, 0x3, {0x6, 0x7, 0x0, {0x4, 0x400, 0x38, 0x7, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x3, 0x0, 0x3, r1, r2, 0x5e, 0x4}}}, 0x78) [ 469.519221] EXT4-fs: 10 callbacks suppressed [ 469.519234] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_idize=0x0000000000000000" or missing value 23:07:23 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff01000000000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 469.767768] EXT4-fs (sda1): re-mounted. Opts: 23:07:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_iiize'}}, {@commit={'commit'}}]}) 23:07:23 executing program 0: r0 = gettid() sched_getattr(r0, &(0x7f0000000140), 0x30, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000002c0)) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:07:23 executing program 3: socketpair$unix(0x1, 0x100023, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r2, 0x1, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44880}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e22, @broadcast}}, 0x0, 0x8000, 0xfffffffffffffff8, 0x9, 0x10}, &(0x7f0000000440)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000580)={0x7, 0x8000, 0x3f, 0x1, 0x0}, &(0x7f00000005c0)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={r3, 0x10000}, &(0x7f0000000600)=0x8) r5 = gettid() ioprio_set$pid(0x0, r5, 0xe6) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x84000, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={r4, 0x1000}, 0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000400)={0x5a, 0x1, 0x0, 0x6, 0x2, 0x400, 0x4689, 0x0, r4}, 0x20) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x6, 0x2001) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000480)) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) ioctl$PPPIOCGUNIT(r1, 0x80047456, &(0x7f0000000380)) 23:07:23 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f000000000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:23 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:23 executing program 3: socketpair$unix(0x1, 0x100023, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r2, 0x1, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44880}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e22, @broadcast}}, 0x0, 0x8000, 0xfffffffffffffff8, 0x9, 0x10}, &(0x7f0000000440)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000580)={0x7, 0x8000, 0x3f, 0x1, 0x0}, &(0x7f00000005c0)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={r3, 0x10000}, &(0x7f0000000600)=0x8) r5 = gettid() ioprio_set$pid(0x0, r5, 0xe6) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x84000, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={r4, 0x1000}, 0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000400)={0x5a, 0x1, 0x0, 0x6, 0x2, 0x400, 0x4689, 0x0, r4}, 0x20) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x6, 0x2001) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000480)) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) ioctl$PPPIOCGUNIT(r1, 0x80047456, &(0x7f0000000380)) [ 469.959154] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iiize=0x0000000000000000" or missing value 23:07:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = getuid() syz_mount_image$ext4(0x0, &(0x7f0000000880)='./file0\x00', 0x0, 0xffffffffffffff11, 0x0, 0x100020, &(0x7f0000000940)=ANY=[@ANYBLOB="636f98666666666666666666d62c392e7561643d", @ANYRESDEC=r0, @ANYBLOB="2c6f626a5f747970653d636f6d6d69742c686173682c6673757569643d773036610064313f2d673177352d313337372d753867392d3e35667f3b7664322c7569643d", @ANYRESDEC=r0, @ANYBLOB=',\x00']) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0xc000, 0x0) setsockopt$ax25_int(r1, 0x101, 0x9, &(0x7f0000000200)=0x5b89, 0x4) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000500)=[&(0x7f0000000280)='.eth0bdevnodevvboxnet1system\x00', &(0x7f00000002c0)='nodev\x00', &(0x7f0000000300)='(\x00', &(0x7f0000000340)='wlan1$md5sumem0vmnet1vmnet0lo\x00', &(0x7f0000000380)='commit', &(0x7f00000003c0)='/dev/full\x00', &(0x7f0000000400)='commit', &(0x7f0000000440)='\x00', &(0x7f0000000480)='/dev/autofs\x00', &(0x7f00000004c0)='\x00'], &(0x7f0000000800)=[&(0x7f0000000580)='/dev/full\x00', &(0x7f00000005c0)='/dev/autofs\x00', &(0x7f0000000600)='/dev/full\x00', &(0x7f0000000640)='/dev/autofs\x00', &(0x7f0000000680)='/dev/full\x00', &(0x7f00000006c0)='*trusted,cgroupcgroup\x00', &(0x7f0000000700)='/dev/autofs\x00', &(0x7f0000000740)='commit', &(0x7f0000000780)='commit', &(0x7f00000007c0)='/dev/full\x00']) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x2102, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x80000001, 0x0, 0x1}) syslog(0x5, &(0x7f00000009c0)=""/204, 0xcc) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000180)={0x14a, r3, 0x10000, 0x1}) 23:07:23 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 470.091474] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iiize=0x0000000000000000" or missing value 23:07:23 executing program 0: r0 = gettid() sched_getattr(r0, &(0x7f0000000140), 0x30, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000002c0)) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:07:23 executing program 3: socketpair$unix(0x1, 0x100023, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r2, 0x1, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44880}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e22, @broadcast}}, 0x0, 0x8000, 0xfffffffffffffff8, 0x9, 0x10}, &(0x7f0000000440)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000580)={0x7, 0x8000, 0x3f, 0x1, 0x0}, &(0x7f00000005c0)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={r3, 0x10000}, &(0x7f0000000600)=0x8) r5 = gettid() ioprio_set$pid(0x0, r5, 0xe6) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x84000, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={r4, 0x1000}, 0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000400)={0x5a, 0x1, 0x0, 0x6, 0x2, 0x400, 0x4689, 0x0, r4}, 0x20) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x6, 0x2001) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000480)) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) 23:07:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 23:07:23 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 23:07:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_ilize'}}, {@commit={'commit'}}]}) 23:07:23 executing program 3: socketpair$unix(0x1, 0x100023, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r2, 0x1, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44880}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e22, @broadcast}}, 0x0, 0x8000, 0xfffffffffffffff8, 0x9, 0x10}, &(0x7f0000000440)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000580)={0x7, 0x8000, 0x3f, 0x1, 0x0}, &(0x7f00000005c0)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={r3, 0x10000}, &(0x7f0000000600)=0x8) r5 = gettid() ioprio_set$pid(0x0, r5, 0xe6) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x84000, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={r4, 0x1000}, 0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000400)={0x5a, 0x1, 0x0, 0x6, 0x2, 0x400, 0x4689, 0x0, r4}, 0x20) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x6, 0x2001) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000480)) 23:07:23 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x40}, [{}]}, 0x78) [ 470.440984] EXT4-fs (sda1): re-mounted. Opts: [ 470.488615] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ilize=0x0000000000000000" or missing value 23:07:24 executing program 3: socketpair$unix(0x1, 0x100023, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r2, 0x1, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44880}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e22, @broadcast}}, 0x0, 0x8000, 0xfffffffffffffff8, 0x9, 0x10}, &(0x7f0000000440)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000580)={0x7, 0x8000, 0x3f, 0x1, 0x0}, &(0x7f00000005c0)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={r3, 0x10000}, &(0x7f0000000600)=0x8) r5 = gettid() ioprio_set$pid(0x0, r5, 0xe6) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x84000, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={r4, 0x1000}, 0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000400)={0x5a, 0x1, 0x0, 0x6, 0x2, 0x400, 0x4689, 0x0, r4}, 0x20) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x6, 0x2001) [ 470.554747] EXT4-fs (sda1): re-mounted. Opts: [ 470.705031] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ilize=0x0000000000000000" or missing value 23:07:24 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:24 executing program 0: r0 = gettid() sched_getattr(r0, &(0x7f0000000140), 0x30, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000002c0)) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:07:24 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x40}, [{}]}, 0x78) 23:07:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='commit=0xfffffffffffffff9\x00']) 23:07:24 executing program 3: socketpair$unix(0x1, 0x100023, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r2, 0x1, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44880}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e22, @broadcast}}, 0x0, 0x8000, 0xfffffffffffffff8, 0x9, 0x10}, &(0x7f0000000440)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000580)={0x7, 0x8000, 0x3f, 0x1, 0x0}, &(0x7f00000005c0)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={r3, 0x10000}, &(0x7f0000000600)=0x8) r5 = gettid() ioprio_set$pid(0x0, r5, 0xe6) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x84000, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={r4, 0x1000}, 0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000400)={0x5a, 0x1, 0x0, 0x6, 0x2, 0x400, 0x4689, 0x0, r4}, 0x20) 23:07:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_ioize'}}, {@commit={'commit'}}]}) 23:07:24 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x40}, [{}]}, 0x78) 23:07:24 executing program 3: socketpair$unix(0x1, 0x100023, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r2, 0x1, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44880}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e22, @broadcast}}, 0x0, 0x8000, 0xfffffffffffffff8, 0x9, 0x10}, &(0x7f0000000440)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000580)={0x7, 0x8000, 0x3f, 0x1, 0x0}, &(0x7f00000005c0)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={r3, 0x10000}, &(0x7f0000000600)=0x8) r5 = gettid() ioprio_set$pid(0x0, r5, 0xe6) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x84000, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={r4, 0x1000}, 0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) [ 470.962497] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ioize=0x0000000000000000" or missing value 23:07:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = request_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='selinux\x00', 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f00000001c0)='trusted\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB="636f6d6d69743d3078667d60a16666666666666666666666392c00"]) 23:07:24 executing program 0: r0 = gettid() sched_getattr(r0, &(0x7f0000000140), 0x30, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000002c0)) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000040)) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 471.096822] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ioize=0x0000000000000000" or missing value 23:07:24 executing program 3: socketpair$unix(0x1, 0x100023, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r2, 0x1, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44880}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e22, @broadcast}}, 0x0, 0x8000, 0xfffffffffffffff8, 0x9, 0x10}, &(0x7f0000000440)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000580)={0x7, 0x8000, 0x3f, 0x1, 0x0}, &(0x7f00000005c0)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={r3, 0x10000}, &(0x7f0000000600)=0x8) r5 = gettid() ioprio_set$pid(0x0, r5, 0xe6) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x84000, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={r4, 0x1000}, 0x8) 23:07:24 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x40}, [{}]}, 0x78) 23:07:25 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0xfffffea6) 23:07:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_ipize'}}, {@commit={'commit'}}]}) 23:07:25 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x40}, [{}]}, 0x78) 23:07:25 executing program 3: socketpair$unix(0x1, 0x100023, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r2, 0x1, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44880}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e22, @broadcast}}, 0x0, 0x8000, 0xfffffffffffffff8, 0x9, 0x10}, &(0x7f0000000440)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000580)={0x7, 0x8000, 0x3f, 0x1, 0x0}, &(0x7f00000005c0)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={r3, 0x10000}, &(0x7f0000000600)=0x8) r4 = gettid() ioprio_set$pid(0x0, r4, 0xe6) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x84000, 0x0) 23:07:25 executing program 0: r0 = gettid() sched_getattr(r0, &(0x7f0000000140), 0x30, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f00000002c0)) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:07:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB="636f6d6d69743d81666666666666666666666666666667392c0000"]) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.swap.current\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f00000002c0)={0x0, 0x25, &(0x7f0000000240)="e00ff9c31e1a95e88f6b4218475b32b55273d916b82368c99b37bfa96f0940285f715fa72d"}) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xa1, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000001c0)=0x54) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f0000000280)={0xe, 0x100, 0x3, {0x3d, 0x6, 0x7f, 0x8}}) 23:07:25 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x40}, [{}]}, 0x78) 23:07:25 executing program 0: r0 = gettid() sched_getattr(r0, &(0x7f0000000140), 0x30, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)}, 0x0) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:07:25 executing program 3: socketpair$unix(0x1, 0x100023, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r2, 0x1, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44880}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e22, @broadcast}}, 0x0, 0x8000, 0xfffffffffffffff8, 0x9, 0x10}, &(0x7f0000000440)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000580)={0x7, 0x8000, 0x3f, 0x1, 0x0}, &(0x7f00000005c0)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={r3, 0x10000}, &(0x7f0000000600)=0x8) r4 = gettid() ioprio_set$pid(0x0, r4, 0xe6) 23:07:25 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0xfffffea6) 23:07:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_iuize'}}, {@commit={'commit'}}]}) 23:07:25 executing program 3: socketpair$unix(0x1, 0x100023, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r2, 0x1, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44880}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e22, @broadcast}}, 0x0, 0x8000, 0xfffffffffffffff8, 0x9, 0x10}, &(0x7f0000000440)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000580)={0x7, 0x8000, 0x3f, 0x1, 0x0}, &(0x7f00000005c0)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={r3, 0x10000}, &(0x7f0000000600)=0x8) gettid() 23:07:25 executing program 0: r0 = gettid() sched_getattr(r0, &(0x7f0000000140), 0x30, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:07:25 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x40}, [{}]}, 0x78) 23:07:25 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0xfffffea6) 23:07:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x201, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x80) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000140)={0x0, @bt={0x7, 0x2, 0x1, 0x2, 0xffff, 0x0, 0x4c000, 0x50000000, 0x4, 0x7, 0x0, 0x3ff, 0x1, 0x401, 0x1, 0x19}}) r1 = socket$isdn(0x22, 0x3, 0x22) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000240)='nlmon0\x00') 23:07:25 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, 0x0, 0x0) 23:07:25 executing program 0: r0 = gettid() sched_getattr(r0, &(0x7f0000000140), 0x30, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:07:25 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x40}, [{}]}, 0x78) 23:07:25 executing program 3: socketpair$unix(0x1, 0x100023, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r2, 0x1, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44880}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e22, @broadcast}}, 0x0, 0x8000, 0xfffffffffffffff8, 0x9, 0x10}, &(0x7f0000000440)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000580)={0x7, 0x8000, 0x3f, 0x1, 0x0}, &(0x7f00000005c0)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={r3, 0x10000}, &(0x7f0000000600)=0x8) 23:07:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_ivize'}}, {@commit={'commit'}}]}) 23:07:25 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, 0x0, 0x0) 23:07:26 executing program 0: r0 = gettid() sched_getattr(r0, &(0x7f0000000140), 0x30, 0x0) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:07:26 executing program 3: socketpair$unix(0x1, 0x100023, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r2, 0x1, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44880}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e22, @broadcast}}, 0x0, 0x8000, 0xfffffffffffffff8, 0x9, 0x10}, &(0x7f0000000440)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000580)={0x7, 0x8000, 0x3f, 0x1}, &(0x7f00000005c0)=0x10) 23:07:26 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x40}, [{}]}, 0x78) 23:07:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x800, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 23:07:26 executing program 3: socketpair$unix(0x1, 0x100023, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r2, 0x1, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44880}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e22, @broadcast}}, 0x0, 0x8000, 0xfffffffffffffff8, 0x9, 0x10}, &(0x7f0000000440)=0x98) 23:07:26 executing program 0: gettid() symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:07:26 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, 0x0, 0x0) 23:07:26 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, 0x0, 0x40}, [{}]}, 0x78) 23:07:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_ixize'}}, {@commit={'commit'}}]}) 23:07:26 executing program 3: socketpair$unix(0x1, 0x100023, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r2, 0x1, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44880}, 0x0) 23:07:26 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:07:26 executing program 3: socketpair$unix(0x1, 0x100023, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') 23:07:26 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88, 0x0, 0x40}, [{}]}, 0x78) 23:07:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@commit={'commit'}}]}) 23:07:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)=ANY=[@ANYPTR, @ANYBLOB="94aba013da6c2f64a5ba3a3ba909460a6f69b5c2391a9ebc1222821cf9996991b368350669dd5640cb802c08d89fbeb2d34d75f4cbd1f92264fe46a29377c1d54cb786c4502880af98b5ef22707f240531632002b77652d1b559998a43995c81913afa7b52c43606b1e67b2e3f164ed50cdeddd3d83603ba0aaa095be1dc477a54886fbc23d01bf32db3f07ef94e5be37d307e6c26995464ec43728c7d994f4c78ce44d34cc49e73c3dd6f33cff0bd8d2c993e1d3ee7b25d9c2acb0cd0f232d71291d2fe022b527faaebe10fe485f67e70b9f27c9448e4de5a9e649aac0e0ac135c44fddb2d13ea32d221b95ac204f94c4cb961c9695093f48cd8ff9b99f44d85144f53f44eba5a20ff06ce8ecb11224d5c3850f55ced49b2192b634102d5a8a7f279b81ae1b9618f393c828aad6a92364e6f45a43f38c994ce8901fa14d0d7fe2ad42f1b2b7d4cc17ac5f140939fa409ad7822d08425fb54a74bd8ed41e7df18249bb640893c9d33a4bbd713e4b3c59b3569fa3b46d48542c91f674f15d31e3be9b4a1feb1f9135705d1ee27299ffb044f0c02f6592d95c1c8c244f25264c0592922acd2a616dcf463bd82f30d5379014a9eddbc6fcfc296d6c11d708d2ea2e339ab26473f2ff80a58839bb03319d3a21a4aef752e401b47671cdbed9226482ea120f7946dd059806b724e31d6459c3c4bcf0363b593fa29118f18cc748ef7eb16d81370330a6d5c190196bb8245309b049bb61abb2a1a9124f84f2c0d1edd4069b9eead244aa253321c5b7c15cf453a3a981e1e290028ddc849c69c7d05ecf4a69921eeb3eae15132c0e1ec38b72c7efd1c90c13052d9d1b1ad21e1081908feb3bea5c9a38a7046f85af66971a29ec5a370bf47ea750dcf6bd68b60ba7dcefc1e95d08800aad13d55899ce14b0100431349015f0e542f633b7ffb15a336e4b67cbb41157e54272110baf95ce4a2b7e69b395e1437c322329dfc61bc98c57c9ca0e253fa0fd02ad10e89a50ee56a8f60d106e8a9a76ac0a2aafe41a974aabf1c39061d1d16ed82f6866f0c60d3405e2b2687e35139b42f2db7843a17d6cb1d19109903dfad9cd037f004cc07c85d61c17ef8bbf1fb58e43ff8c9dea5eebfb669a8248bd8cfd314b94f35e6877b7505d8ef8183232b72304c397bb72c5cc1d2a17f38633b220332fb0f819488a1764239ae18529b3f57df6e3a326c8be0763c40be5100df8b9a73c8d8703becf22a56653714a3f2b6fd3c89726b9bf94f2a4a814f5b9b91015bf4370bee5128db4cb41d6b643a0fb0da4fafb65773b1b2230f2b2732542ccc5b159a392cc09eb54740923e9f8bd54b79b8de6ce9a83b34c3badc724179d750d506d6fe650046705e60a1f69b2d9ade8512e3f065d8cae1f3a6692572f5aaa2cab1d67499156b496faf0e284bfc664a1caf4bb8cb515ed593a9775dd36a897816b892eb3a77477b5fcc67b7ee5563af7033b6f91d8559266b409b7ca54feb11e3634cb3847a01bfb251c0a49799aa28eb2a7bd61b2378adb393a6f9d715e10384f2abbe87ad9d71e8fe2e7082ac28df1c2c548a184e1907a9515911c1888595aca3e87fd0fdeec1110130dc746bbbf9962ba8c1179c490bcf7ab01f15b1c84d59407ea5ddd7b1c8945485295d79b4912a39bc80c28ade2ec8316aa68d42fdeaa23b8260a843ac68ee91fc47b803947f962cc7475b0dc8a7be460440e4693f5fbbc0a129635319ddd3896e5d2199644c5e9472ad79d5cac43f4a8f37d7233e45afc2787d9d5723cbe246c9b226c203fec22ded467faec8a23e262bb969617aca613dc006a22845f19d7a34a0abe7925caa49468f4cf7000ce7ec7d5a0be85533da5142409e2c7ab3b5dc1192655ee745e2860e3b053deebc7ede9ac6b1b41097abd1a0ead27bf6c8fbeeca3edd384fa532a2ba2ff8af84588f020eb7745259c5bf442c6946101666696ad051cdb383ee89ecacb25e86dc9e778ab955685d2b9f1e5f6aeea7af07be01a86a31a248ed4a8da579ea6cfa3473ab35d3bd8c989bb7d425393e154b2c4460f1ef7309188255ca1065b4cd242422a52f504d48878f2ef36ef54783480ff2fe137d18e4e7102c9c45331cc56c92441854c8c9e8c2aab0408590610e92b107785cb5e371d6e418954f88cfe15f1946db1d6e0c16439e5f046c571a070e541ff2c054bb453eace4733faab9aeed5d09bc79fc862a834867637147bb9f83675e6d99e31877a6b6da56ce41a819590e7e6a2ef194980ff1a1f7c8fa975070775e6b8cf6e6b327fe3d36f79a7c4c31519a72733c9d9966a0565dc58de4a7301ad424f6c9fd0ce7f1c9f9663d39fe9f4671a704e77591a8d56741c6a0212c60368ef0483f40ff027616c99a257602204ccb41b8924147934c624d3963f197fa6c1d61c9a65659b567a7e438af418c3e52c5a5ca13a10b8ebe3ef9a29036a2bbe54523e60bd4a90481255a9c201cd3cc53cf7dae3282cabd34797d0aeb00e4772526a8ad7e16339d63c4e9fd0652ebdcb17948d30333366fc1864417b021139dc7f7e8c755260faac3247bdbb3b227dfb61255f7014924849e68a524690e0cc8bb30931ac72e2f8ecf96fbe62eb1815a47a6a8fcd1ba4ba5fc669ccf3beeff4d24f0b533d118569c0ec3cfe50f7a461922b574873650582df25f7af70e4ca48222ef14b723d8852bc34aaf9444daeba74cf2b0a240c5e5522bdc1b3ba6cb666952fc4dc8974cd488eec7ed5ff1a55f1b1cb55d9b0ee0f50f9a11e87a7507f208f948ba1be77f7997387f14f7595ca11c52fb1f70711ab8a37b26ec00a1f5519294cc30706000000f6d481ba664eebd7f4a6ccfdd4b6431d4a3af84b58ad7bbeb7a6577e7efd4cba807c21ee6f557fb18fac06c8c5b0abecf5547ea133b2bae1811227b38560c5bb8c58b96a9dc8d4537c07d174904adbd9ed9c683711336fa27d2a435c30ff62034a12aade8312e6aaf1cd3855bd4aff0ca4f002c9c472d444261c0035ed043912fbe81a6259f2d4e0883f00e133fe76be4eb1320270f16789a291575c9428b9ef512759f15b0bd29f19bef59113d4e5bcd9336cbe75fe46e4305aa8ca3cab87c9c3c729a6ce3c02474d7cd2b4f5d3f4cc62ae680e7f74215d66988425471c218e33cd11982f6b13953a36bbbe6a980e629fd8634a2ec008cbbe077e1e97d7e02ba6d648d294a9084a8044bc117ebbd7a49e6bf0ebbc7814ef40e4aa4ff2e3a66a7fb7d39aa3b8cf808b6cc1e1a292768181a44fb72e88d5267366c8a02d2b4b0267739708964b76a00edb6fc8ee9618b19f7bf3e26d08f393a8ce463232dbda23eb42452b39df7034df750527845dab354be1e3598e925a59fd5c5710372184d549f290d22ff330a05bbbaa3069206b352b5f2a96646a2cb06007cc753493f922f1966eee3d926f62ebc7f0c871277003d6db79a0813bd75e5222f0a103f6cdd2b649f1cea98e14eb5f9be975e5e066e6902c941c65be30d59659cf0fc57a3cb5b99facb90523d5b388bde1f88b4d9f01b42a7d817cf9b436c32b812dfcf3ebca9749d2a897dc7b7c9bea12a22bf52d02e8688a033f4a109e7a452046864c0466911d40f0061269c6bb96bd5b3e0134a00c9e3e7beb23d95f14160d80589a2ce90872f3c54df8999a55255ed0b2d9b582b4d534a128ec649fecd2e3d18504de0f852036593158dfe83a74cc1ae875f9255de38e9dd8b49e27db36f38324d1182bb26cd052af0e44ea0503241dc0e20d7929c794c485e9d5b2b3826e2f902edcf78ee4cac75e39bea8b8327c5dbf0f6de6be5ace7f22ad35ec8d2e2321c8d32abb1681b9fdb268e6c92b8b78adec020371c3b812b5417ed23a085fd0d77a1ef362cfaa8fee0e399fb915963b020e3c398b66eba21caa6dad7845e01a7620443cf0280e1cd88c4f99cdf4b9bc9501e2afc4fd030747a7dec1abd744b44e4eb2bef0c9110e583f41915d1b4cfa16197b186714f92bbf642770d05f3fbb05776090676d1d366de6feb81395cfd5781866fdcbc26cbd218556c458a2d443f5a792045c59fda8c84b3136e5e4a9e4628c5da97d7a750cf2d2464720cce4c4befe8fe078dc317e3256a83429949c1896169b5299cf0124ffdb8435b750cea351480ce474edc1d02a0ffb89e38e224b5dc5a9df7b7382c737cf51cd6677fe64ae399a3259290485075f92e114629255a87e7309759df9db488f0dc1e325829bafcf70d74d64548b42a9721f2df5b28f39f7e5541ec2f941f3583aeaffc1e10c6f96075f2a22d4dadfaf1acf983f35a88b9d904813cca2ae9e1364adecf0e45bc08ccfb4650eeed2b1d5bbc92046c1ba9a2eb5994f1d5e2e7316701728b7ea5cc0915630d106c1b331e23adbf98d4037465216614492ea9fb2679b347c3f17fdd16b03319414941554fe00d25f43b4776eead594ecc5e300e7135bcfb02b05f06aae90c33a9aba6512053c0c02b68a4003c0332fec171bac695630074840a11c703142855b0cc3c771f8751e8adcae9e552afe8f994a2163f917749b76b571f3d062a4b9649ca9dcf890af3907db43194c2432c0903db8a25dbbfdbabd4b56167a79969ebbe26e4c8a57d3f7c7e6499f5c92dcea0115f918102b7e24d2b064e22068d4dde3038cc19f2d17e3a2313d3ecc7e03ee1d85f054fc8ce4075dc76356705fc84b5e95869f6106fa2dd877689247c29040781e21a41430a7f5d17f179834b9211868f9ac4c3cacb6292cbef2ed6afccae296bda9de5e9e90b320d9a8b7578b8f078952aec22b0200692836fcacffb41bc72e981cdbbc33bfacaaa3f802c621a9c55efed33c4029a4b9eafd251b09e5c7f7d834c67aca39760c6c427290b763509a9d0a4d8993680f449c18151934d72f0e47c8c9e44cc7bccdc15f20a346e82f5ae996f2eaae2a4d5a7f1f99d3802e0b2134daa89caf3fd8cf06eca00118dc04ab9dc1bceaf906f0264e5963ed2c15cc2f6dbd076d270f8c8a48968a9be8697751d7c3e524280cb561b3f4fbc2a7ca484f5066cac491f0fa7e5aa196ec7767b15c18220af8b38e6ef969f01d0bd4e4683ee95770cf2e6ec8dd535b131861b89adda4cca9634d874fd5eb840e51901a0d40db623b9fa57797b5ea0dcb6283725bf5046b98888d786e28f256823354e8d3a3d32c004cd690afed590d91bc39ce6981d61d6bcdb177fddff36c5d93317bbaf8e2bc2c4653b040cd70d559e5ac601699fe99e7f75c05156f99ad79b8e3cec4952d88aa00f02e9c8b84b416e7853809c322dcdd1ee34d9a1c1175d68e8d1b7c1b20cd97dafd0af9fe86850f048210f246bcef40baa2eb4bdb86902ca3c24b0bf1c2b86e25402a0d3966ef76d41f6f9b273b308478669c2e1767f735e0c6e6f9119cf826df3b9ca72b1725e8cc244c83acebfa42c354412a015a9dbae211aa27419ad0c568b3b0482b44bf0697856b82242057a4fb26026690c49cfb70ab3ea29cf29ee5b98ecbac228550662fb964f8f1436824daccbc5a39e7284c97e08760797af5bf9415717fcbf056adf3931d3431385acb6153d1be8865c29fd87fc90ee19ff7c17ffd596ccf5f0b05924c539423f28e0868f309da6d8c63c2c4e27742ac57a8774595ecb836484164d14472d64ee7dc4bd602f198c5c18060159ba0ff375c3fb89951a2fa45c00a789caf37e1da19f309d803a2c3e4fbaca019e94908ca7a83690bf418f7b81df821e40612e6a9fc1041018e4f6eaa517c09abac4e7de3ef0515d140236aef76879b7cc8f541e2a78fe3d50988f7274bb1f868fa2f", @ANYRES64, @ANYRESDEC, @ANYRES32, @ANYRESOCT]) 23:07:26 executing program 0: symlink(0x0, &(0x7f0000000100)='./file0\x00') 23:07:26 executing program 3: socketpair$unix(0x1, 0x100023, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:26 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x408, 0x0, 0x40}, [{}]}, 0x78) 23:07:26 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', 0x0) 23:07:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_is\nze'}}, {@commit={'commit'}}]}) 23:07:26 executing program 2 (fault-call:4 fault-nth:0): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:26 executing program 3: socketpair$unix(0x1, 0x100023, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:26 executing program 0 (fault-call:0 fault-nth:0): symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:07:26 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x40}, [{}]}, 0x78) [ 473.407413] FAULT_INJECTION: forcing a failure. [ 473.407413] name failslab, interval 1, probability 0, space 0, times 0 [ 473.452015] CPU: 0 PID: 27843 Comm: syz-executor2 Not tainted 5.0.0-rc2+ #29 [ 473.459250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.459286] Call Trace: [ 473.459307] dump_stack+0x1db/0x2d0 [ 473.459323] ? dump_stack_print_info.cold+0x20/0x20 [ 473.459338] ? mark_held_locks+0x100/0x100 [ 473.484454] should_fail.cold+0xa/0x15 [ 473.485260] FAULT_INJECTION: forcing a failure. [ 473.485260] name failslab, interval 1, probability 0, space 0, times 0 [ 473.488343] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 473.488364] ? ___might_sleep+0x1e7/0x310 [ 473.508788] ? arch_local_save_flags+0x50/0x50 [ 473.513368] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 473.513406] ? iov_iter_alignment+0x234/0xcf0 [ 473.513425] __should_failslab+0x121/0x190 [ 473.527635] should_failslab+0x9/0x14 [ 473.531458] kmem_cache_alloc+0x2be/0x710 [ 473.535715] ? print_usage_bug+0xd0/0xd0 [ 473.539783] do_blockdev_direct_IO+0x5a5/0xdc10 [ 473.544456] ? mark_held_locks+0x100/0x100 [ 473.548699] ? print_usage_bug+0xd0/0xd0 [ 473.552762] ? check_noncircular+0x20/0x20 [ 473.557001] ? __lock_acquire+0x572/0x4a30 [ 473.561227] ? mark_held_locks+0x100/0x100 [ 473.565460] ? check_noncircular+0x20/0x20 [ 473.569695] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 473.575356] ? write_end_fn+0xf0/0xf0 [ 473.579161] ? ext4_dio_get_block_unwritten_sync+0xf0/0xf0 [ 473.584790] ? sb_init_dio_done_wq+0x90/0x90 [ 473.589201] ? print_usage_bug+0xd0/0xd0 [ 473.593263] ? __lock_acquire+0x572/0x4a30 [ 473.597526] ? mark_held_locks+0x100/0x100 [ 473.601754] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 473.607297] ? __lock_acquire+0x572/0x4a30 [ 473.611531] ? print_usage_bug+0xd0/0xd0 [ 473.615612] ? rcu_read_unlock_special+0x380/0x380 [ 473.620637] ? print_usage_bug+0xd0/0xd0 [ 473.624715] ? mark_held_locks+0x100/0x100 [ 473.628948] ? __lock_acquire+0x572/0x4a30 [ 473.633182] ? add_lock_to_list.isra.0+0x450/0x450 [ 473.638189] ? mark_held_locks+0x100/0x100 [ 473.642416] ? add_lock_to_list.isra.0+0x450/0x450 [ 473.647330] ? __lock_is_held+0xb6/0x140 [ 473.651408] ? ext4_direct_IO+0xfee/0x2090 [ 473.655634] ? find_held_lock+0x35/0x120 [ 473.659697] ? ext4_direct_IO+0xfee/0x2090 [ 473.663931] ? lock_acquire+0x1db/0x570 [ 473.667921] ? lock_downgrade+0x910/0x910 [ 473.672066] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 473.677595] ? ext4_journal_check_start+0x188/0x230 [ 473.682615] ? up_write+0x7b/0x230 [ 473.686156] ? ext4_dio_get_block_unwritten_sync+0xf0/0xf0 [ 473.691770] __blockdev_direct_IO+0xa1/0xca [ 473.696082] ? write_end_fn+0xf0/0xf0 [ 473.699875] ext4_direct_IO+0x10a3/0x2090 [ 473.704012] ? ext4_dio_get_block_unwritten_sync+0xf0/0xf0 [ 473.709643] ? ext4_iomap_end+0x7e0/0x7e0 [ 473.713803] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 473.719331] ? file_remove_privs+0x213/0x500 [ 473.723741] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 473.729380] ? filemap_check_errors+0xd8/0x110 [ 473.733964] generic_file_direct_write+0x214/0x4b0 [ 473.738896] __generic_file_write_iter+0x2ee/0x630 [ 473.743913] ext4_file_write_iter+0x37a/0x1410 [ 473.748487] ? __mutex_lock+0x622/0x1670 [ 473.752638] ? ext4_file_mmap+0x410/0x410 [ 473.756784] ? mutex_trylock+0x2d0/0x2d0 [ 473.760836] ? add_lock_to_list.isra.0+0x450/0x450 [ 473.765753] ? iterate_fd+0x4b0/0x4b0 [ 473.769547] ? proc_fail_nth_write+0xa0/0x220 [ 473.774034] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 473.779563] ? iov_iter_init+0xea/0x220 [ 473.783542] __vfs_write+0x764/0xb40 [ 473.787247] ? check_preemption_disabled+0x48/0x290 [ 473.792258] ? kernel_read+0x120/0x120 [ 473.796146] ? rcu_read_lock_sched_held+0x110/0x130 [ 473.801151] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 473.805892] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 473.811436] ? __sb_start_write+0x1ac/0x360 [ 473.815751] vfs_write+0x20c/0x580 [ 473.819289] ksys_write+0x105/0x260 [ 473.822909] ? __ia32_sys_read+0xb0/0xb0 [ 473.826973] ? trace_hardirqs_off_caller+0x300/0x300 [ 473.832077] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 473.838315] __x64_sys_write+0x73/0xb0 [ 473.842194] do_syscall_64+0x1a3/0x800 [ 473.846072] ? syscall_return_slowpath+0x5f0/0x5f0 [ 473.850992] ? prepare_exit_to_usermode+0x232/0x3b0 [ 473.856006] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 473.860858] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 473.866033] RIP: 0033:0x457ec9 [ 473.869214] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 473.888379] RSP: 002b:00007f633448bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 473.896089] RAX: ffffffffffffffda RBX: 00007f633448bc90 RCX: 0000000000457ec9 23:07:27 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x80) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'L+', 0x52ce}, 0x28, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) 23:07:27 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x40}, [{}]}, 0x78) [ 473.903361] RDX: 00000000fffffea6 RSI: 0000000020000000 RDI: 0000000000000004 [ 473.910706] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 473.917968] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f633448c6d4 [ 473.925222] R13: 00000000004c71fb R14: 00000000004dcae8 R15: 0000000000000007 [ 473.932497] CPU: 1 PID: 27855 Comm: syz-executor0 Not tainted 5.0.0-rc2+ #29 [ 473.939767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.949136] Call Trace: 23:07:27 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) [ 473.951725] dump_stack+0x1db/0x2d0 [ 473.955364] ? dump_stack_print_info.cold+0x20/0x20 [ 473.960384] ? find_held_lock+0x35/0x120 [ 473.964467] should_fail.cold+0xa/0x15 [ 473.968370] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 473.973498] ? ___might_sleep+0x1e7/0x310 [ 473.977645] ? arch_local_save_flags+0x50/0x50 [ 473.982241] ? kasan_check_write+0x14/0x20 [ 473.986498] __should_failslab+0x121/0x190 [ 473.986517] should_failslab+0x9/0x14 [ 473.986532] kmem_cache_alloc+0x2be/0x710 [ 473.994538] getname_flags+0xd6/0x5b0 [ 473.994556] do_symlinkat+0x8b/0x2c0 [ 473.994572] ? __ia32_sys_unlink+0x50/0x50 [ 473.994588] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 473.994602] ? trace_hardirqs_off_caller+0x300/0x300 [ 473.994617] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 473.994634] __x64_sys_symlink+0x59/0x80 [ 473.994648] do_syscall_64+0x1a3/0x800 [ 473.994665] ? syscall_return_slowpath+0x5f0/0x5f0 [ 474.015926] ? prepare_exit_to_usermode+0x232/0x3b0 [ 474.038562] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 474.038585] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 474.038596] RIP: 0033:0x457ec9 [ 474.056765] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 474.075663] RSP: 002b:00007fd4de890c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 474.083375] RAX: ffffffffffffffda RBX: 00007fd4de890c90 RCX: 0000000000457ec9 [ 474.090654] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 00000000200000c0 [ 474.097923] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 23:07:27 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x40}, [{}]}, 0x78) [ 474.105189] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd4de8916d4 [ 474.112458] R13: 00000000004c63d6 R14: 00000000004db570 R15: 0000000000000003 23:07:27 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) 23:07:27 executing program 2 (fault-call:4 fault-nth:1): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:27 executing program 0 (fault-call:0 fault-nth:1): symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:07:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isvze'}}, {@commit={'commit'}}]}) 23:07:27 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x804, 0x0, 0x40}, [{}]}, 0x78) 23:07:27 executing program 3 (fault-call:0 fault-nth:0): openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) [ 474.330389] FAULT_INJECTION: forcing a failure. [ 474.330389] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 474.342311] CPU: 0 PID: 27893 Comm: syz-executor0 Not tainted 5.0.0-rc2+ #29 [ 474.349494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.358859] Call Trace: [ 474.361475] dump_stack+0x1db/0x2d0 [ 474.365114] ? dump_stack_print_info.cold+0x20/0x20 [ 474.370153] ? add_lock_to_list.isra.0+0x450/0x450 [ 474.375093] ? lock_downgrade+0x910/0x910 [ 474.379243] ? add_lock_to_list.isra.0+0x450/0x450 [ 474.384188] ? __check_object_size+0xa3/0x790 [ 474.388696] should_fail.cold+0xa/0x15 [ 474.392593] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 474.397801] ? get_pid_task+0xd4/0x190 [ 474.401699] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 474.407344] ? kasan_check_read+0x11/0x20 [ 474.411496] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 474.416774] ? rcu_read_unlock_special+0x380/0x380 [ 474.421702] should_fail_alloc_page+0x50/0x60 [ 474.426190] __alloc_pages_nodemask+0x323/0xdc0 [ 474.430848] ? find_held_lock+0x35/0x120 [ 474.434922] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 474.439946] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 474.442660] FAULT_INJECTION: forcing a failure. [ 474.442660] name failslab, interval 1, probability 0, space 0, times 0 [ 474.445500] ? ___might_sleep+0x1e7/0x310 [ 474.445520] ? trace_hardirqs_off+0xb8/0x310 [ 474.445539] cache_grow_begin+0x9c/0x8c0 [ 474.469280] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 474.474820] kmem_cache_alloc+0x645/0x710 [ 474.478976] getname_flags+0xd6/0x5b0 [ 474.482778] do_symlinkat+0x8b/0x2c0 [ 474.486514] ? __ia32_sys_unlink+0x50/0x50 [ 474.490757] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 474.496115] ? trace_hardirqs_off_caller+0x300/0x300 [ 474.501218] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 474.505976] __x64_sys_symlink+0x59/0x80 [ 474.510128] do_syscall_64+0x1a3/0x800 [ 474.514020] ? syscall_return_slowpath+0x5f0/0x5f0 [ 474.518952] ? prepare_exit_to_usermode+0x232/0x3b0 [ 474.523989] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 474.528835] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 474.534021] RIP: 0033:0x457ec9 [ 474.537209] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 474.556105] RSP: 002b:00007fd4de890c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 474.563809] RAX: ffffffffffffffda RBX: 00007fd4de890c90 RCX: 0000000000457ec9 [ 474.571160] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 00000000200000c0 23:07:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @empty}, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000040)=0xe8) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) [ 474.578423] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 474.585782] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd4de8916d4 [ 474.593043] R13: 00000000004c63d6 R14: 00000000004db570 R15: 0000000000000003 [ 474.600331] CPU: 1 PID: 27897 Comm: syz-executor2 Not tainted 5.0.0-rc2+ #29 [ 474.607522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.616969] Call Trace: [ 474.619575] dump_stack+0x1db/0x2d0 [ 474.623216] ? dump_stack_print_info.cold+0x20/0x20 [ 474.628276] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 474.633593] ? add_lock_to_list.isra.0+0x450/0x450 [ 474.638577] should_fail.cold+0xa/0x15 [ 474.642494] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 474.647626] ? ___might_sleep+0x1e7/0x310 [ 474.651793] ? arch_local_save_flags+0x50/0x50 [ 474.656395] __should_failslab+0x121/0x190 [ 474.660643] should_failslab+0x9/0x14 [ 474.664454] __kmalloc+0x2dc/0x740 [ 474.668025] ? ext4_find_extent+0x76e/0x9d0 [ 474.672362] ext4_find_extent+0x76e/0x9d0 [ 474.676539] ext4_ext_map_blocks+0x261/0x60a0 [ 474.681046] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 474.686605] ? ext4_ext_release+0x10/0x10 [ 474.690870] ? check_preemption_disabled+0x48/0x290 [ 474.695920] ? __lock_is_held+0xb6/0x140 [ 474.700009] ? lock_acquire+0x1db/0x570 [ 474.703985] ? ext4_map_blocks+0x496/0x1bb0 [ 474.704003] ? ___might_sleep+0x1e7/0x310 [ 474.704021] ? lock_release+0xc40/0xc40 [ 474.704038] ? ext4_es_lookup_extent+0x478/0xdd0 [ 474.704071] ? down_read+0x8d/0x120 [ 474.704083] ? ext4_map_blocks+0x496/0x1bb0 [ 474.704095] ? __down_interruptible+0x740/0x740 [ 474.704108] ? ext4_direct_IO+0x10a3/0x2090 [ 474.704125] ? generic_file_direct_write+0x214/0x4b0 [ 474.712984] ? __generic_file_write_iter+0x2ee/0x630 [ 474.713007] ext4_map_blocks+0xf90/0x1bb0 [ 474.713031] ? ext4_issue_zeroout+0x170/0x170 [ 474.713051] ? iov_iter_get_pages+0x34c/0x1290 [ 474.713072] ? check_preemption_disabled+0x48/0x290 [ 474.713087] ? do_blockdev_direct_IO+0x5a5/0xdc10 [ 474.713104] _ext4_get_block+0x245/0x7a0 [ 474.727448] EXT4-fs: 13 callbacks suppressed [ 474.727460] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isvze=0x0000000000000000" or missing value [ 474.729744] ? iov_iter_npages+0x289/0xf20 [ 474.729765] ? ext4_map_blocks+0x1bb0/0x1bb0 [ 474.729840] ? blk_start_plug+0xb5/0x340 [ 474.729856] ? iov_iter_npages+0xf20/0xf20 [ 474.735126] FAULT_INJECTION: forcing a failure. [ 474.735126] name failslab, interval 1, probability 0, space 0, times 0 [ 474.738826] ext4_dio_get_block+0xa3/0xc0 [ 474.738845] do_blockdev_direct_IO+0x3822/0xdc10 [ 474.738859] ? mark_held_locks+0x100/0x100 [ 474.738876] ? print_usage_bug+0xd0/0xd0 [ 474.836234] ? __lock_acquire+0x572/0x4a30 [ 474.840489] ? sb_init_dio_done_wq+0x90/0x90 [ 474.844898] ? print_usage_bug+0xd0/0xd0 [ 474.848959] ? __lock_acquire+0x572/0x4a30 [ 474.853214] ? ext4_dio_get_block_unwritten_sync+0xf0/0xf0 [ 474.858849] ? mark_held_locks+0x100/0x100 [ 474.863079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 474.868621] ? __lock_acquire+0x572/0x4a30 [ 474.872868] ? print_usage_bug+0xd0/0xd0 [ 474.876936] ? rcu_read_unlock_special+0x380/0x380 [ 474.881874] ? print_usage_bug+0xd0/0xd0 [ 474.885947] ? mark_held_locks+0x100/0x100 [ 474.890186] ? __lock_acquire+0x572/0x4a30 [ 474.894434] ? add_lock_to_list.isra.0+0x450/0x450 [ 474.899374] ? mark_held_locks+0x100/0x100 [ 474.903627] ? add_lock_to_list.isra.0+0x450/0x450 [ 474.908548] ? __lock_is_held+0xb6/0x140 [ 474.912620] ? ext4_direct_IO+0xfee/0x2090 [ 474.916858] ? find_held_lock+0x35/0x120 [ 474.920960] ? ext4_direct_IO+0xfee/0x2090 [ 474.925192] ? lock_acquire+0x1db/0x570 [ 474.929275] ? lock_downgrade+0x910/0x910 [ 474.933439] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 474.938970] ? ext4_journal_check_start+0x188/0x230 [ 474.944000] ? up_write+0x7b/0x230 [ 474.947528] ? ext4_dio_get_block_unwritten_sync+0xf0/0xf0 [ 474.953146] __blockdev_direct_IO+0xa1/0xca [ 474.957480] ? write_end_fn+0xf0/0xf0 [ 474.961277] ext4_direct_IO+0x10a3/0x2090 [ 474.965428] ? ext4_dio_get_block_unwritten_sync+0xf0/0xf0 [ 474.971060] ? ext4_iomap_end+0x7e0/0x7e0 [ 474.975225] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 474.980775] ? file_remove_privs+0x213/0x500 [ 474.985180] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 474.990710] ? filemap_check_errors+0xd8/0x110 [ 474.995309] generic_file_direct_write+0x214/0x4b0 [ 475.000237] __generic_file_write_iter+0x2ee/0x630 [ 475.005164] ext4_file_write_iter+0x37a/0x1410 [ 475.009824] ? __mutex_lock+0x622/0x1670 [ 475.013975] ? ext4_file_mmap+0x410/0x410 [ 475.018134] ? mutex_trylock+0x2d0/0x2d0 [ 475.022194] ? add_lock_to_list.isra.0+0x450/0x450 [ 475.027123] ? iterate_fd+0x4b0/0x4b0 [ 475.030925] ? proc_fail_nth_write+0xa0/0x220 [ 475.035421] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 475.041059] ? iov_iter_init+0xea/0x220 [ 475.045210] __vfs_write+0x764/0xb40 [ 475.048920] ? check_preemption_disabled+0x48/0x290 [ 475.053939] ? kernel_read+0x120/0x120 [ 475.057840] ? rcu_read_lock_sched_held+0x110/0x130 [ 475.062853] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 475.067604] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 475.073138] ? __sb_start_write+0x1ac/0x360 [ 475.077457] vfs_write+0x20c/0x580 [ 475.080999] ksys_write+0x105/0x260 [ 475.084634] ? __ia32_sys_read+0xb0/0xb0 [ 475.088699] ? trace_hardirqs_off_caller+0x300/0x300 [ 475.093799] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 475.098560] __x64_sys_write+0x73/0xb0 [ 475.102448] do_syscall_64+0x1a3/0x800 [ 475.106339] ? syscall_return_slowpath+0x5f0/0x5f0 [ 475.111270] ? prepare_exit_to_usermode+0x232/0x3b0 [ 475.116306] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 475.121158] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 475.126341] RIP: 0033:0x457ec9 [ 475.129531] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 475.148438] RSP: 002b:00007f633448bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 475.156139] RAX: ffffffffffffffda RBX: 00007f633448bc90 RCX: 0000000000457ec9 [ 475.163404] RDX: 00000000fffffea6 RSI: 0000000020000000 RDI: 0000000000000004 [ 475.170667] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 475.177931] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f633448c6d4 [ 475.185201] R13: 00000000004c71fb R14: 00000000004dcae8 R15: 0000000000000007 [ 475.192536] CPU: 0 PID: 27900 Comm: syz-executor3 Not tainted 5.0.0-rc2+ #29 [ 475.199727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.199734] Call Trace: [ 475.211653] dump_stack+0x1db/0x2d0 [ 475.215305] ? dump_stack_print_info.cold+0x20/0x20 [ 475.220337] should_fail.cold+0xa/0x15 [ 475.224237] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 475.229381] ? ___might_sleep+0x1e7/0x310 [ 475.233541] ? arch_local_save_flags+0x50/0x50 [ 475.238139] __should_failslab+0x121/0x190 [ 475.242382] should_failslab+0x9/0x14 [ 475.246192] kmem_cache_alloc+0x2be/0x710 [ 475.250365] ? wait_for_completion+0x810/0x810 [ 475.250389] getname_flags+0xd6/0x5b0 [ 475.250404] getname+0x1a/0x20 [ 475.255779] FAULT_INJECTION: forcing a failure. [ 475.255779] name failslab, interval 1, probability 0, space 0, times 0 [ 475.258772] do_sys_open+0x3a5/0x7c0 [ 475.258787] ? fput+0x128/0x1a0 [ 475.258802] ? filp_open+0x80/0x80 23:07:28 executing program 0 (fault-call:0 fault-nth:2): symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:07:28 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x40}, [{}]}, 0x78) [ 475.258817] ? __ia32_sys_read+0xb0/0xb0 [ 475.273159] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 475.273175] ? trace_hardirqs_off_caller+0x300/0x300 [ 475.273194] __x64_sys_openat+0x9d/0x100 [ 475.273213] do_syscall_64+0x1a3/0x800 [ 475.273228] ? syscall_return_slowpath+0x5f0/0x5f0 [ 475.287835] ? prepare_exit_to_usermode+0x232/0x3b0 [ 475.287857] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 475.287879] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 475.287892] RIP: 0033:0x457ec9 [ 475.306227] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 475.306235] RSP: 002b:00007fa0bbfd8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 475.306248] RAX: ffffffffffffffda RBX: 00007fa0bbfd8c90 RCX: 0000000000457ec9 [ 475.306256] RDX: 0000000000002761 RSI: 0000000020000200 RDI: ffffffffffffffff [ 475.306270] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 475.306278] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa0bbfd96d4 [ 475.306285] R13: 00000000004c3eaf R14: 00000000004d70a0 R15: 0000000000000003 [ 475.387247] CPU: 0 PID: 27909 Comm: syz-executor0 Not tainted 5.0.0-rc2+ #29 [ 475.399885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.409227] Call Trace: [ 475.409248] dump_stack+0x1db/0x2d0 [ 475.409269] ? dump_stack_print_info.cold+0x20/0x20 [ 475.409284] ? cache_grow_end+0xa4/0x190 [ 475.409301] should_fail.cold+0xa/0x15 [ 475.409315] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 475.433600] ? ___might_sleep+0x1e7/0x310 [ 475.437755] ? arch_local_save_flags+0x50/0x50 [ 475.442351] __should_failslab+0x121/0x190 [ 475.446680] should_failslab+0x9/0x14 [ 475.450503] kmem_cache_alloc+0x2be/0x710 [ 475.454674] getname_flags+0xd6/0x5b0 [ 475.458473] do_symlinkat+0xde/0x2c0 [ 475.458491] ? __ia32_sys_unlink+0x50/0x50 [ 475.458533] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 475.471794] ? trace_hardirqs_off_caller+0x300/0x300 [ 475.476899] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 475.481661] __x64_sys_symlink+0x59/0x80 [ 475.485728] do_syscall_64+0x1a3/0x800 [ 475.489626] ? syscall_return_slowpath+0x5f0/0x5f0 [ 475.494560] ? prepare_exit_to_usermode+0x232/0x3b0 [ 475.499603] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 475.504469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 475.509652] RIP: 0033:0x457ec9 [ 475.512839] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:07:28 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200, 0x0, 0x40}, [{}]}, 0x78) 23:07:28 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00, 0x0, 0x40}, [{}]}, 0x78) 23:07:28 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7800, 0x0, 0x40}, [{}]}, 0x78) 23:07:29 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8008, 0x0, 0x40}, [{}]}, 0x78) 23:07:29 executing program 2 (fault-call:4 fault-nth:2): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) [ 475.531833] RSP: 002b:00007fd4de890c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 475.539545] RAX: ffffffffffffffda RBX: 00007fd4de890c90 RCX: 0000000000457ec9 [ 475.546814] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 00000000200000c0 [ 475.554092] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 475.561358] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd4de8916d4 [ 475.568625] R13: 00000000004c63d6 R14: 00000000004db570 R15: 0000000000000003 23:07:29 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8800, 0x0, 0x40}, [{}]}, 0x78) [ 475.622620] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isvze=0x0000000000000000" or missing value [ 475.662300] FAULT_INJECTION: forcing a failure. [ 475.662300] name failslab, interval 1, probability 0, space 0, times 0 [ 475.673632] CPU: 0 PID: 27935 Comm: syz-executor2 Not tainted 5.0.0-rc2+ #29 [ 475.680814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.690160] Call Trace: [ 475.690197] dump_stack+0x1db/0x2d0 [ 475.690217] ? dump_stack_print_info.cold+0x20/0x20 [ 475.690230] ? __lock_acquire+0x572/0x4a30 [ 475.690261] should_fail.cold+0xa/0x15 [ 475.696460] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 475.696474] ? mark_held_locks+0x100/0x100 [ 475.696490] ? rcu_softirq_qs+0x20/0x20 [ 475.696519] ? kernel_text_address+0x73/0xf0 [ 475.727307] ? __kernel_text_address+0xd/0x40 [ 475.731782] __should_failslab+0x121/0x190 [ 475.736000] should_failslab+0x9/0x14 [ 475.739783] kmem_cache_alloc+0x47/0x710 [ 475.743827] ? __es_remove_extent+0x871/0xb30 [ 475.748314] __es_insert_extent+0x366/0x1190 [ 475.752723] ? ext4_es_free_extent+0x770/0x770 [ 475.757310] ? do_raw_read_unlock+0x70/0x70 [ 475.761628] ? __lock_is_held+0xb6/0x140 [ 475.765723] ext4_es_insert_extent+0x369/0xc80 [ 475.770311] ? ext4_es_scan_clu+0x50/0x50 [ 475.774462] ? ext4_es_init_tree+0x70/0x70 [ 475.774514] ext4_ext_put_gap_in_cache+0x176/0x200 [ 475.774530] ? ext4_rereserve_cluster+0x240/0x240 [ 475.788575] ? ext4_find_extent+0x76e/0x9d0 [ 475.792890] ? ext4_find_extent+0x6a6/0x9d0 [ 475.792913] ext4_ext_map_blocks+0x2ab8/0x60a0 [ 475.792941] ? ext4_ext_release+0x10/0x10 [ 475.792958] ? check_preemption_disabled+0x48/0x290 [ 475.810980] ? __lock_is_held+0xb6/0x140 [ 475.815052] ? lock_acquire+0x1db/0x570 [ 475.819028] ? ext4_map_blocks+0x496/0x1bb0 [ 475.823353] ? ___might_sleep+0x1e7/0x310 [ 475.827507] ? lock_release+0xc40/0xc40 [ 475.831485] ? ext4_es_lookup_extent+0x478/0xdd0 [ 475.836267] ? down_read+0x8d/0x120 [ 475.839897] ? ext4_map_blocks+0x496/0x1bb0 [ 475.844225] ? __down_interruptible+0x740/0x740 [ 475.849039] ? ext4_direct_IO+0x10a3/0x2090 [ 475.853366] ? generic_file_direct_write+0x214/0x4b0 [ 475.858480] ? __generic_file_write_iter+0x2ee/0x630 [ 475.858506] ext4_map_blocks+0xf90/0x1bb0 [ 475.858525] ? ext4_issue_zeroout+0x170/0x170 [ 475.867752] ? iov_iter_get_pages+0x34c/0x1290 [ 475.867769] ? check_preemption_disabled+0x48/0x290 [ 475.867782] ? do_blockdev_direct_IO+0x5a5/0xdc10 [ 475.867798] _ext4_get_block+0x245/0x7a0 [ 475.890815] ? iov_iter_npages+0x289/0xf20 [ 475.895038] ? ext4_map_blocks+0x1bb0/0x1bb0 [ 475.899424] ? blk_start_plug+0xb5/0x340 [ 475.903468] ? iov_iter_npages+0xf20/0xf20 [ 475.907698] ext4_dio_get_block+0xa3/0xc0 [ 475.911834] do_blockdev_direct_IO+0x3822/0xdc10 [ 475.916573] ? mark_held_locks+0x100/0x100 [ 475.920797] ? print_usage_bug+0xd0/0xd0 [ 475.924866] ? __lock_acquire+0x572/0x4a30 [ 475.929097] ? sb_init_dio_done_wq+0x90/0x90 [ 475.933490] ? print_usage_bug+0xd0/0xd0 [ 475.937538] ? __lock_acquire+0x572/0x4a30 [ 475.941768] ? ext4_dio_get_block_unwritten_sync+0xf0/0xf0 [ 475.947381] ? mark_held_locks+0x100/0x100 [ 475.951611] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 475.957157] ? __lock_acquire+0x572/0x4a30 [ 475.961385] ? print_usage_bug+0xd0/0xd0 [ 475.965430] ? rcu_read_unlock_special+0x380/0x380 [ 475.970346] ? print_usage_bug+0xd0/0xd0 [ 475.974399] ? mark_held_locks+0x100/0x100 [ 475.978632] ? __lock_acquire+0x572/0x4a30 [ 475.982872] ? add_lock_to_list.isra.0+0x450/0x450 [ 475.987796] ? mark_held_locks+0x100/0x100 [ 475.992015] ? add_lock_to_list.isra.0+0x450/0x450 [ 475.996938] ? __lock_is_held+0xb6/0x140 [ 476.000991] ? ext4_direct_IO+0xfee/0x2090 [ 476.005228] ? find_held_lock+0x35/0x120 [ 476.009285] ? ext4_direct_IO+0xfee/0x2090 [ 476.013503] ? lock_acquire+0x1db/0x570 [ 476.017476] ? lock_downgrade+0x910/0x910 [ 476.021626] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 476.027148] ? ext4_journal_check_start+0x188/0x230 [ 476.032153] ? up_write+0x7b/0x230 [ 476.035674] ? ext4_dio_get_block_unwritten_sync+0xf0/0xf0 [ 476.041299] __blockdev_direct_IO+0xa1/0xca [ 476.045613] ? write_end_fn+0xf0/0xf0 [ 476.049400] ext4_direct_IO+0x10a3/0x2090 [ 476.053531] ? ext4_dio_get_block_unwritten_sync+0xf0/0xf0 [ 476.059144] ? ext4_iomap_end+0x7e0/0x7e0 [ 476.063281] ? generic_update_time+0x268/0x440 [ 476.067866] ? file_remove_privs+0x500/0x500 [ 476.072276] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 476.077819] ? preempt_count_add+0xbc/0x1b0 [ 476.082134] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 476.087660] ? __mnt_drop_write+0x5d/0x80 [ 476.091792] ? __mnt_drop_write_file+0x31/0x40 [ 476.096354] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 476.101875] ? filemap_check_errors+0xd8/0x110 [ 476.106446] generic_file_direct_write+0x214/0x4b0 [ 476.111369] __generic_file_write_iter+0x2ee/0x630 [ 476.116291] ext4_file_write_iter+0x37a/0x1410 [ 476.120877] ? __mutex_lock+0x622/0x1670 [ 476.124929] ? ext4_file_mmap+0x410/0x410 [ 476.129094] ? mutex_trylock+0x2d0/0x2d0 [ 476.133149] ? add_lock_to_list.isra.0+0x450/0x450 [ 476.138069] ? iterate_fd+0x4b0/0x4b0 [ 476.141879] ? proc_fail_nth_write+0xa0/0x220 [ 476.146358] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 476.151893] ? iov_iter_init+0xea/0x220 [ 476.155848] __vfs_write+0x764/0xb40 [ 476.159541] ? check_preemption_disabled+0x48/0x290 [ 476.164550] ? kernel_read+0x120/0x120 [ 476.168426] ? rcu_read_lock_sched_held+0x110/0x130 [ 476.173419] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 476.178153] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 476.183673] ? __sb_start_write+0x1ac/0x360 [ 476.187976] vfs_write+0x20c/0x580 [ 476.191498] ksys_write+0x105/0x260 [ 476.195115] ? __ia32_sys_read+0xb0/0xb0 [ 476.199156] ? trace_hardirqs_off_caller+0x300/0x300 [ 476.204240] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 476.208984] __x64_sys_write+0x73/0xb0 [ 476.212973] do_syscall_64+0x1a3/0x800 [ 476.216845] ? syscall_return_slowpath+0x5f0/0x5f0 [ 476.221767] ? prepare_exit_to_usermode+0x232/0x3b0 [ 476.226784] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 476.231629] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 476.236799] RIP: 0033:0x457ec9 [ 476.239982] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 476.258862] RSP: 002b:00007f633448bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 476.266551] RAX: ffffffffffffffda RBX: 00007f633448bc90 RCX: 0000000000457ec9 23:07:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isi\ne'}}, {@commit={'commit'}}]}) 23:07:29 executing program 3 (fault-call:0 fault-nth:1): openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:29 executing program 0 (fault-call:0 fault-nth:3): symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 476.273804] RDX: 00000000fffffea6 RSI: 0000000020000000 RDI: 0000000000000004 [ 476.281053] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 476.288300] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f633448c6d4 [ 476.295548] R13: 00000000004c71fb R14: 00000000004dcae8 R15: 0000000000000007 [ 476.366316] FAULT_INJECTION: forcing a failure. [ 476.366316] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 476.378344] CPU: 0 PID: 27947 Comm: syz-executor3 Not tainted 5.0.0-rc2+ #29 [ 476.385531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.394879] Call Trace: [ 476.397482] dump_stack+0x1db/0x2d0 [ 476.401121] ? dump_stack_print_info.cold+0x20/0x20 [ 476.406248] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 476.411792] ? _kstrtoull+0x17d/0x250 [ 476.415604] should_fail.cold+0xa/0x15 [ 476.419588] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 476.424697] ? find_held_lock+0x35/0x120 [ 476.428771] ? get_pid_task+0xd4/0x190 [ 476.432679] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 476.438243] should_fail_alloc_page+0x50/0x60 [ 476.442734] __alloc_pages_nodemask+0x323/0xdc0 [ 476.447424] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 476.452446] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 476.458003] ? ___might_sleep+0x1e7/0x310 [ 476.462148] ? trace_hardirqs_off+0xb8/0x310 [ 476.466559] cache_grow_begin+0x9c/0x8c0 [ 476.470613] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 476.476150] kmem_cache_alloc+0x645/0x710 [ 476.480382] ? wait_for_completion+0x810/0x810 [ 476.484981] getname_flags+0xd6/0x5b0 [ 476.488783] getname+0x1a/0x20 [ 476.491976] do_sys_open+0x3a5/0x7c0 [ 476.495686] ? fput+0x128/0x1a0 [ 476.498960] ? filp_open+0x80/0x80 [ 476.502496] ? __ia32_sys_read+0xb0/0xb0 [ 476.506552] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 476.511911] ? trace_hardirqs_off_caller+0x300/0x300 [ 476.517015] __x64_sys_openat+0x9d/0x100 [ 476.521077] do_syscall_64+0x1a3/0x800 [ 476.524976] ? syscall_return_slowpath+0x5f0/0x5f0 [ 476.529906] ? prepare_exit_to_usermode+0x232/0x3b0 [ 476.534923] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 476.539773] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 476.544955] RIP: 0033:0x457ec9 [ 476.548144] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 476.567039] RSP: 002b:00007fa0bbfd8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 476.574744] RAX: ffffffffffffffda RBX: 00007fa0bbfd8c90 RCX: 0000000000457ec9 [ 476.582012] RDX: 0000000000002761 RSI: 0000000020000200 RDI: ffffffffffffffff [ 476.589287] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 476.596547] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa0bbfd96d4 [ 476.603808] R13: 00000000004c3eaf R14: 00000000004d70a0 R15: 0000000000000003 [ 476.612060] FAULT_INJECTION: forcing a failure. [ 476.612060] name failslab, interval 1, probability 0, space 0, times 0 [ 476.641374] CPU: 0 PID: 27948 Comm: syz-executor0 Not tainted 5.0.0-rc2+ #29 [ 476.648760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.658108] Call Trace: [ 476.660703] dump_stack+0x1db/0x2d0 [ 476.664354] ? dump_stack_print_info.cold+0x20/0x20 [ 476.669380] ? pagecache_get_page+0x2a4/0x1020 [ 476.673973] ? print_usage_bug+0xd0/0xd0 [ 476.678043] should_fail.cold+0xa/0x15 [ 476.681949] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 476.687051] ? ___might_sleep+0x1e7/0x310 [ 476.691201] ? __lock_acquire+0x572/0x4a30 [ 476.695460] ? arch_local_save_flags+0x50/0x50 [ 476.700037] ? kasan_check_write+0x14/0x20 [ 476.704266] ? __brelse+0x105/0x180 [ 476.707893] ? __getblk_gfp+0xc3/0xd20 [ 476.711999] ? block_commit_write+0x30/0x30 [ 476.716350] __should_failslab+0x121/0x190 [ 476.720587] should_failslab+0x9/0x14 [ 476.724386] kmem_cache_alloc+0x2be/0x710 [ 476.728532] ? print_usage_bug+0xd0/0xd0 [ 476.732596] ext4_alloc_inode+0xa5/0x860 [ 476.736660] ? ratelimit_state_init+0xb0/0xb0 [ 476.741185] ? add_lock_to_list.isra.0+0x450/0x450 [ 476.746118] ? print_usage_bug+0xd0/0xd0 [ 476.750200] ? add_lock_to_list.isra.0+0x450/0x450 [ 476.755133] ? is_bpf_text_address+0xac/0x170 [ 476.759641] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 476.765187] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 476.770721] ? ratelimit_state_init+0xb0/0xb0 [ 476.775204] alloc_inode+0x66/0x190 [ 476.778806] new_inode_pseudo+0x71/0x1b0 [ 476.782842] ? prune_icache_sb+0x1c0/0x1c0 [ 476.787081] new_inode+0x1f/0x40 [ 476.790451] __ext4_new_inode+0x484/0x6cb0 [ 476.794695] ? kernel_text_address+0x73/0xf0 [ 476.799115] ? unwind_get_return_address+0x61/0xa0 [ 476.804060] ? __save_stack_trace+0x8a/0xf0 [ 476.808368] ? ext4_free_inode+0x1a80/0x1a80 [ 476.812761] ? save_stack+0xa9/0xd0 [ 476.816371] ? save_stack+0x45/0xd0 [ 476.819976] ? __kasan_slab_free+0x102/0x150 [ 476.824361] ? kasan_slab_free+0xe/0x10 [ 476.828311] ? kmem_cache_free+0x86/0x260 [ 476.832458] ? putname+0xef/0x130 [ 476.835898] ? filename_create+0x29d/0x5a0 [ 476.840144] ? do_symlinkat+0xf3/0x2c0 [ 476.844023] ? __x64_sys_symlink+0x59/0x80 [ 476.848238] ? do_syscall_64+0x1a3/0x800 [ 476.852282] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 476.857628] ? print_usage_bug+0xd0/0xd0 [ 476.861666] ? do_raw_spin_unlock+0xa0/0x330 [ 476.866055] ? trace_hardirqs_on_caller+0x310/0x310 [ 476.871048] ? do_raw_spin_trylock+0x270/0x270 [ 476.875608] ? d_instantiate_anon+0x30/0x30 [ 476.879934] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 476.885451] ? __dquot_initialize+0x632/0xda0 [ 476.889923] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 476.895443] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 476.901047] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 476.905975] ? common_perm+0x1f1/0x7b0 [ 476.909841] ? dquot_get_next_dqblk+0x180/0x180 [ 476.914487] ? __lock_is_held+0xb6/0x140 [ 476.918539] ? putname+0xef/0x130 [ 476.921974] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 476.926982] ? map_id_up+0x19c/0x3e0 [ 476.930689] ext4_symlink+0x4df/0xee0 [ 476.934479] ? ext4_orphan_del+0xe10/0xe10 [ 476.938698] ? security_inode_permission+0xd5/0x110 [ 476.943693] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 476.949208] ? security_inode_symlink+0xe1/0x120 [ 476.953949] vfs_symlink+0x378/0x5d0 [ 476.957644] do_symlinkat+0x239/0x2c0 [ 476.961429] ? __ia32_sys_unlink+0x50/0x50 [ 476.965647] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 476.970988] ? trace_hardirqs_off_caller+0x300/0x300 [ 476.976074] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 476.980820] __x64_sys_symlink+0x59/0x80 [ 476.984992] do_syscall_64+0x1a3/0x800 [ 476.988855] ? syscall_return_slowpath+0x5f0/0x5f0 [ 476.993764] ? prepare_exit_to_usermode+0x232/0x3b0 [ 476.998777] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 477.003604] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.008773] RIP: 0033:0x457ec9 [ 477.011943] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 477.030823] RSP: 002b:00007fd4de890c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 477.038627] RAX: ffffffffffffffda RBX: 00007fd4de890c90 RCX: 0000000000457ec9 [ 477.045877] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 00000000200000c0 [ 477.053124] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 477.060369] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd4de8916d4 23:07:30 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x101002, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) epoll_create1(0x80000) 23:07:30 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff01, 0x0, 0x40}, [{}]}, 0x78) 23:07:30 executing program 3 (fault-call:0 fault-nth:2): openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:30 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:30 executing program 0 (fault-call:0 fault-nth:4): symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:07:30 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f, 0x0, 0x40}, [{}]}, 0x78) [ 477.067715] R13: 00000000004c63d6 R14: 00000000004db570 R15: 0000000000000003 [ 477.182060] FAULT_INJECTION: forcing a failure. [ 477.182060] name failslab, interval 1, probability 0, space 0, times 0 [ 477.202620] CPU: 0 PID: 27960 Comm: syz-executor3 Not tainted 5.0.0-rc2+ #29 [ 477.209831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.219174] Call Trace: [ 477.221762] dump_stack+0x1db/0x2d0 [ 477.221783] ? dump_stack_print_info.cold+0x20/0x20 [ 477.221810] should_fail.cold+0xa/0x15 [ 477.234317] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 477.239437] ? ___might_sleep+0x1e7/0x310 [ 477.243590] ? arch_local_save_flags+0x50/0x50 [ 477.248185] __should_failslab+0x121/0x190 [ 477.252430] should_failslab+0x9/0x14 [ 477.256233] kmem_cache_alloc_trace+0x2d1/0x760 [ 477.260910] ? __might_sleep+0x95/0x190 [ 477.264890] apparmor_file_alloc_security+0x172/0xad0 [ 477.270077] ? rcu_pm_notify+0xd0/0xd0 [ 477.273969] ? apparmor_path_rename+0xcb0/0xcb0 [ 477.278643] ? __alloc_file+0x93/0x480 [ 477.282561] ? __alloc_file+0x93/0x480 [ 477.286447] ? rcu_read_lock_sched_held+0x110/0x130 [ 477.291464] ? kmem_cache_alloc+0x341/0x710 [ 477.295796] ? __lock_acquire+0x572/0x4a30 [ 477.300034] security_file_alloc+0x69/0xb0 [ 477.304277] __alloc_file+0x128/0x480 [ 477.308079] ? file_free_rcu+0xe0/0xe0 [ 477.311970] ? mark_held_locks+0x100/0x100 [ 477.316209] ? add_lock_to_list.isra.0+0x450/0x450 [ 477.321150] alloc_empty_file+0x72/0x170 [ 477.325213] path_openat+0x112/0x5650 [ 477.329010] ? add_lock_to_list.isra.0+0x450/0x450 [ 477.333946] ? __alloc_fd+0x549/0x700 [ 477.337777] ? find_held_lock+0x35/0x120 [ 477.341837] ? path_lookupat.isra.0+0xba0/0xba0 [ 477.346503] ? do_dup2+0x580/0x580 [ 477.350047] ? kasan_check_read+0x11/0x20 [ 477.354195] ? do_raw_spin_unlock+0xa0/0x330 [ 477.358719] ? do_raw_spin_trylock+0x270/0x270 [ 477.363317] ? __phys_addr_symbol+0x30/0x70 [ 477.367644] do_filp_open+0x26f/0x370 [ 477.371440] ? may_open_dev+0x100/0x100 [ 477.375425] ? exit_files+0xb0/0xb0 [ 477.379056] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 477.384600] ? digsig_verify.cold+0x32/0x32 [ 477.388923] ? get_unused_fd_flags+0x122/0x1a0 [ 477.393504] ? __alloc_fd+0x700/0x700 [ 477.397297] ? getname_flags+0x277/0x5b0 [ 477.401363] do_sys_open+0x59a/0x7c0 [ 477.405076] ? fput+0x128/0x1a0 [ 477.408356] ? filp_open+0x80/0x80 [ 477.411895] ? __ia32_sys_read+0xb0/0xb0 [ 477.415955] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.421315] ? trace_hardirqs_off_caller+0x300/0x300 [ 477.426425] __x64_sys_openat+0x9d/0x100 [ 477.430508] do_syscall_64+0x1a3/0x800 [ 477.434402] ? syscall_return_slowpath+0x5f0/0x5f0 [ 477.439330] ? prepare_exit_to_usermode+0x232/0x3b0 [ 477.444346] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 477.449193] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.454380] RIP: 0033:0x457ec9 [ 477.457573] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 477.476473] RSP: 002b:00007fa0bbfd8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 477.484324] RAX: ffffffffffffffda RBX: 00007fa0bbfd8c90 RCX: 0000000000457ec9 [ 477.491603] RDX: 0000000000002761 RSI: 0000000020000200 RDI: ffffffffffffffff [ 477.498875] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 477.506183] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa0bbfd96d4 [ 477.513544] R13: 00000000004c3eaf R14: 00000000004d70a0 R15: 0000000000000003 [ 477.533338] FAULT_INJECTION: forcing a failure. [ 477.533338] name failslab, interval 1, probability 0, space 0, times 0 [ 477.550116] CPU: 0 PID: 27966 Comm: syz-executor0 Not tainted 5.0.0-rc2+ #29 [ 477.557351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.566730] Call Trace: [ 477.569431] dump_stack+0x1db/0x2d0 [ 477.573077] ? dump_stack_print_info.cold+0x20/0x20 [ 477.578110] ? path_init+0x1ef0/0x1ef0 [ 477.582029] should_fail.cold+0xa/0x15 [ 477.585932] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 477.591046] ? ___might_sleep+0x1e7/0x310 [ 477.595201] ? arch_local_save_flags+0x50/0x50 [ 477.599796] __should_failslab+0x121/0x190 [ 477.604037] should_failslab+0x9/0x14 [ 477.607846] kmem_cache_alloc+0x2be/0x710 [ 477.612007] __d_alloc+0xae/0xbe0 [ 477.615465] ? d_lookup+0x163/0x360 [ 477.619098] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 477.624121] ? d_alloc_parallel+0x1f10/0x1f10 [ 477.628622] ? trace_hardirqs_on+0xbd/0x310 [ 477.633041] ? lookup_dcache+0x23/0x140 [ 477.637020] ? trace_hardirqs_off_caller+0x300/0x300 [ 477.642132] ? lock_acquire+0x1db/0x570 [ 477.646103] ? filename_create+0x1a8/0x5a0 [ 477.650350] ? ___might_sleep+0x1e7/0x310 [ 477.654503] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 477.659520] d_alloc+0x99/0x420 [ 477.662826] ? __d_lookup+0x960/0x960 [ 477.666642] ? __d_alloc+0xbe0/0xbe0 [ 477.670384] __lookup_hash+0xcd/0x190 [ 477.674187] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 477.679725] filename_create+0x1d6/0x5a0 [ 477.683804] ? kern_path_mountpoint+0x40/0x40 [ 477.688305] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 477.693840] ? getname_flags+0x277/0x5b0 [ 477.697908] do_symlinkat+0xf3/0x2c0 [ 477.701627] ? __ia32_sys_unlink+0x50/0x50 [ 477.705864] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.711224] ? trace_hardirqs_off_caller+0x300/0x300 [ 477.716328] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 477.721085] __x64_sys_symlink+0x59/0x80 [ 477.725158] do_syscall_64+0x1a3/0x800 [ 477.729047] ? syscall_return_slowpath+0x5f0/0x5f0 [ 477.733979] ? prepare_exit_to_usermode+0x232/0x3b0 [ 477.738999] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 477.743850] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.749030] RIP: 0033:0x457ec9 [ 477.752223] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 477.771131] RSP: 002b:00007fd4de890c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 477.778838] RAX: ffffffffffffffda RBX: 00007fd4de890c90 RCX: 0000000000457ec9 [ 477.786099] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 00000000200000c0 [ 477.793369] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 477.800653] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd4de8916d4 [ 477.807923] R13: 00000000004c63d6 R14: 00000000004db570 R15: 0000000000000003 23:07:31 executing program 3 (fault-call:0 fault-nth:3): openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:31 executing program 0 (fault-call:0 fault-nth:5): symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 477.847462] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isi [ 477.847462] e=0x0000000000000000" or missing value 23:07:31 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23c22, 0x0, 0x40}, [{}]}, 0x78) [ 477.971064] FAULT_INJECTION: forcing a failure. [ 477.971064] name failslab, interval 1, probability 0, space 0, times 0 [ 477.989179] FAULT_INJECTION: forcing a failure. [ 477.989179] name failslab, interval 1, probability 0, space 0, times 0 [ 478.005979] CPU: 1 PID: 27983 Comm: syz-executor3 Not tainted 5.0.0-rc2+ #29 [ 478.013184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.022535] Call Trace: [ 478.025142] dump_stack+0x1db/0x2d0 [ 478.028781] ? dump_stack_print_info.cold+0x20/0x20 [ 478.033819] should_fail.cold+0xa/0x15 [ 478.037717] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 478.042833] ? ___might_sleep+0x1e7/0x310 [ 478.046991] ? arch_local_save_flags+0x50/0x50 [ 478.051581] __should_failslab+0x121/0x190 [ 478.055812] should_failslab+0x9/0x14 [ 478.059604] kmem_cache_alloc_trace+0x2d1/0x760 [ 478.064274] ? __might_sleep+0x95/0x190 [ 478.068253] apparmor_file_alloc_security+0x172/0xad0 [ 478.073439] ? rcu_pm_notify+0xd0/0xd0 [ 478.077333] ? apparmor_path_rename+0xcb0/0xcb0 [ 478.081996] ? __alloc_file+0x93/0x480 [ 478.085888] ? __alloc_file+0x93/0x480 [ 478.089804] ? rcu_read_lock_sched_held+0x110/0x130 [ 478.094814] ? kmem_cache_alloc+0x341/0x710 [ 478.099140] ? __lock_acquire+0x572/0x4a30 [ 478.103375] security_file_alloc+0x69/0xb0 [ 478.107607] __alloc_file+0x128/0x480 [ 478.111509] ? file_free_rcu+0xe0/0xe0 [ 478.115397] ? mark_held_locks+0x100/0x100 [ 478.119720] ? add_lock_to_list.isra.0+0x450/0x450 [ 478.124646] alloc_empty_file+0x72/0x170 [ 478.128707] path_openat+0x112/0x5650 [ 478.132503] ? add_lock_to_list.isra.0+0x450/0x450 [ 478.137434] ? __alloc_fd+0x549/0x700 [ 478.141222] ? find_held_lock+0x35/0x120 [ 478.145276] ? path_lookupat.isra.0+0xba0/0xba0 [ 478.149932] ? do_dup2+0x580/0x580 [ 478.153469] ? kasan_check_read+0x11/0x20 [ 478.157607] ? do_raw_spin_unlock+0xa0/0x330 [ 478.162011] ? do_raw_spin_trylock+0x270/0x270 [ 478.166587] ? __phys_addr_symbol+0x30/0x70 [ 478.170914] do_filp_open+0x26f/0x370 [ 478.174706] ? may_open_dev+0x100/0x100 [ 478.178668] ? exit_files+0xb0/0xb0 [ 478.182287] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 478.187821] ? digsig_verify.cold+0x32/0x32 [ 478.192141] ? get_unused_fd_flags+0x122/0x1a0 [ 478.196716] ? __alloc_fd+0x700/0x700 [ 478.200504] ? getname_flags+0x277/0x5b0 [ 478.204561] do_sys_open+0x59a/0x7c0 [ 478.208264] ? fput+0x128/0x1a0 [ 478.211551] ? filp_open+0x80/0x80 [ 478.215085] ? __ia32_sys_read+0xb0/0xb0 [ 478.219149] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.224504] ? trace_hardirqs_off_caller+0x300/0x300 [ 478.229602] __x64_sys_openat+0x9d/0x100 [ 478.233659] do_syscall_64+0x1a3/0x800 [ 478.237541] ? syscall_return_slowpath+0x5f0/0x5f0 [ 478.242462] ? prepare_exit_to_usermode+0x232/0x3b0 [ 478.247477] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 478.252325] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.257508] RIP: 0033:0x457ec9 [ 478.260817] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 478.279719] RSP: 002b:00007fa0bbfd8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 478.287424] RAX: ffffffffffffffda RBX: 00007fa0bbfd8c90 RCX: 0000000000457ec9 [ 478.294683] RDX: 0000000000002761 RSI: 0000000020000200 RDI: ffffffffffffffff [ 478.301937] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 478.309198] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa0bbfd96d4 [ 478.316458] R13: 00000000004c3eaf R14: 00000000004d70a0 R15: 0000000000000003 [ 478.328961] CPU: 0 PID: 27984 Comm: syz-executor0 Not tainted 5.0.0-rc2+ #29 [ 478.336162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.345498] Call Trace: [ 478.345542] dump_stack+0x1db/0x2d0 [ 478.345559] ? dump_stack_print_info.cold+0x20/0x20 [ 478.345575] ? pagecache_get_page+0x2a4/0x1020 [ 478.345588] ? print_usage_bug+0xd0/0xd0 [ 478.345605] should_fail.cold+0xa/0x15 [ 478.345619] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 478.356796] ? ___might_sleep+0x1e7/0x310 [ 478.356809] ? __lock_acquire+0x572/0x4a30 [ 478.356823] ? arch_local_save_flags+0x50/0x50 [ 478.356837] ? kasan_check_write+0x14/0x20 [ 478.356849] ? __brelse+0x105/0x180 [ 478.356861] ? __getblk_gfp+0xc3/0xd20 [ 478.399027] ? block_commit_write+0x30/0x30 [ 478.403449] __should_failslab+0x121/0x190 [ 478.407697] should_failslab+0x9/0x14 [ 478.411503] kmem_cache_alloc+0x2be/0x710 [ 478.415650] ? print_usage_bug+0xd0/0xd0 [ 478.419707] ext4_alloc_inode+0xa5/0x860 [ 478.423785] ? ratelimit_state_init+0xb0/0xb0 [ 478.428283] ? add_lock_to_list.isra.0+0x450/0x450 [ 478.433211] ? print_usage_bug+0xd0/0xd0 [ 478.437273] ? add_lock_to_list.isra.0+0x450/0x450 [ 478.442197] ? is_bpf_text_address+0xac/0x170 [ 478.446813] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 478.452352] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 478.458006] ? ratelimit_state_init+0xb0/0xb0 [ 478.462500] alloc_inode+0x66/0x190 [ 478.466138] new_inode_pseudo+0x71/0x1b0 [ 478.470188] ? prune_icache_sb+0x1c0/0x1c0 [ 478.474426] new_inode+0x1f/0x40 [ 478.477792] __ext4_new_inode+0x484/0x6cb0 [ 478.482029] ? kernel_text_address+0x73/0xf0 [ 478.486441] ? unwind_get_return_address+0x61/0xa0 [ 478.491372] ? __save_stack_trace+0x8a/0xf0 [ 478.495692] ? ext4_free_inode+0x1a80/0x1a80 [ 478.500110] ? save_stack+0xa9/0xd0 [ 478.503734] ? save_stack+0x45/0xd0 [ 478.507364] ? __kasan_slab_free+0x102/0x150 [ 478.511764] ? kasan_slab_free+0xe/0x10 [ 478.515736] ? kmem_cache_free+0x86/0x260 [ 478.519877] ? putname+0xef/0x130 [ 478.523322] ? filename_create+0x29d/0x5a0 [ 478.527554] ? do_symlinkat+0xf3/0x2c0 [ 478.531433] ? __x64_sys_symlink+0x59/0x80 [ 478.531447] ? do_syscall_64+0x1a3/0x800 [ 478.531462] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.531481] ? print_usage_bug+0xd0/0xd0 [ 478.531494] ? do_raw_spin_unlock+0xa0/0x330 [ 478.539748] ? trace_hardirqs_on_caller+0x310/0x310 [ 478.539761] ? do_raw_spin_trylock+0x270/0x270 [ 478.539777] ? d_instantiate_anon+0x30/0x30 [ 478.539792] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 478.539804] ? __dquot_initialize+0x632/0xda0 [ 478.577429] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 478.582975] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 478.588513] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 478.593442] ? common_perm+0x1f1/0x7b0 [ 478.597338] ? dquot_get_next_dqblk+0x180/0x180 [ 478.602006] ? __lock_is_held+0xb6/0x140 [ 478.606070] ? putname+0xef/0x130 [ 478.609537] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 478.614548] ? map_id_up+0x19c/0x3e0 [ 478.618261] ext4_symlink+0x4df/0xee0 [ 478.622082] ? ext4_orphan_del+0xe10/0xe10 [ 478.626314] ? security_inode_permission+0xd5/0x110 [ 478.631335] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 478.636871] ? security_inode_symlink+0xe1/0x120 [ 478.641624] vfs_symlink+0x378/0x5d0 [ 478.645343] do_symlinkat+0x239/0x2c0 [ 478.649148] ? __ia32_sys_unlink+0x50/0x50 [ 478.653381] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.658740] ? trace_hardirqs_off_caller+0x300/0x300 [ 478.663846] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 478.668606] __x64_sys_symlink+0x59/0x80 [ 478.672662] do_syscall_64+0x1a3/0x800 [ 478.676548] ? syscall_return_slowpath+0x5f0/0x5f0 [ 478.681474] ? prepare_exit_to_usermode+0x232/0x3b0 [ 478.686490] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 478.691338] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.696531] RIP: 0033:0x457ec9 [ 478.699735] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:07:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isiz\n'}}, {@commit={'commit'}}]}) 23:07:31 executing program 3 (fault-call:0 fault-nth:4): openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:31 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0x11ffffea6) [ 478.718800] RSP: 002b:00007fd4de890c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 478.726504] RAX: ffffffffffffffda RBX: 00007fd4de890c90 RCX: 0000000000457ec9 [ 478.733769] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 00000000200000c0 [ 478.741034] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 478.748302] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd4de8916d4 [ 478.755566] R13: 00000000004c63d6 R14: 00000000004db570 R15: 0000000000000003 [ 478.777875] FAULT_INJECTION: forcing a failure. [ 478.777875] name failslab, interval 1, probability 0, space 0, times 0 [ 478.795992] CPU: 0 PID: 27996 Comm: syz-executor3 Not tainted 5.0.0-rc2+ #29 [ 478.803385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.812814] Call Trace: [ 478.815402] dump_stack+0x1db/0x2d0 [ 478.819123] ? dump_stack_print_info.cold+0x20/0x20 [ 478.824140] ? add_lock_to_list.isra.0+0x450/0x450 [ 478.829086] should_fail.cold+0xa/0x15 [ 478.832996] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 478.838221] ? ___might_sleep+0x1e7/0x310 [ 478.842371] ? arch_local_save_flags+0x50/0x50 [ 478.846989] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 478.852268] __should_failslab+0x121/0x190 [ 478.856499] should_failslab+0x9/0x14 [ 478.860315] kmem_cache_alloc+0x2be/0x710 [ 478.864468] __d_alloc+0xae/0xbe0 [ 478.867917] ? unwind_get_return_address+0x61/0xa0 [ 478.872847] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 478.877860] ? add_lock_to_list.isra.0+0x450/0x450 [ 478.882900] ? mark_held_locks+0x100/0x100 [ 478.887149] ? __d_lookup+0x560/0x960 [ 478.890965] d_alloc+0x99/0x420 [ 478.894240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 478.899772] ? __d_alloc+0xbe0/0xbe0 [ 478.903484] ? lock_downgrade+0x910/0x910 [ 478.907628] ? kasan_check_read+0x11/0x20 [ 478.911770] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 478.917052] d_alloc_parallel+0x11b/0x1f10 [ 478.921296] ? d_lookup+0x163/0x360 [ 478.924932] ? __d_lookup_rcu+0x990/0x990 [ 478.929082] ? trace_hardirqs_on+0xbd/0x310 [ 478.933402] ? lookup_open+0x314/0x1b80 [ 478.937375] ? trace_hardirqs_off_caller+0x300/0x300 [ 478.942479] ? add_lock_to_list.isra.0+0x450/0x450 [ 478.947410] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 478.952421] ? d_lookup+0x23c/0x360 [ 478.956052] ? __d_lookup+0x960/0x960 [ 478.959879] lookup_open+0x57c/0x1b80 [ 478.963688] ? vfs_link+0xb60/0xb60 [ 478.967316] ? lock_release+0xc40/0xc40 [ 478.971306] ? down_read+0x120/0x120 [ 478.975023] path_openat+0x1983/0x5650 [ 478.978915] ? add_lock_to_list.isra.0+0x450/0x450 [ 478.983859] ? path_lookupat.isra.0+0xba0/0xba0 [ 478.988521] ? do_dup2+0x580/0x580 [ 478.992067] ? kasan_check_read+0x11/0x20 [ 478.996344] ? do_raw_spin_unlock+0xa0/0x330 [ 479.000753] ? do_raw_spin_trylock+0x270/0x270 [ 479.005349] ? __phys_addr_symbol+0x30/0x70 [ 479.009732] do_filp_open+0x26f/0x370 [ 479.013550] ? may_open_dev+0x100/0x100 [ 479.017536] ? digsig_verify.cold+0x32/0x32 [ 479.021864] ? __alloc_fd+0x700/0x700 [ 479.025660] ? getname_flags+0x277/0x5b0 [ 479.029743] do_sys_open+0x59a/0x7c0 [ 479.033467] ? fput+0x128/0x1a0 [ 479.036763] ? filp_open+0x80/0x80 [ 479.040310] ? __ia32_sys_read+0xb0/0xb0 [ 479.044377] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 479.049739] ? trace_hardirqs_off_caller+0x300/0x300 [ 479.054842] __x64_sys_openat+0x9d/0x100 [ 479.058905] do_syscall_64+0x1a3/0x800 [ 479.062797] ? syscall_return_slowpath+0x5f0/0x5f0 [ 479.067731] ? prepare_exit_to_usermode+0x232/0x3b0 [ 479.072759] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 479.077610] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 479.082797] RIP: 0033:0x457ec9 [ 479.085990] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 479.104886] RSP: 002b:00007fa0bbfd8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 479.112589] RAX: ffffffffffffffda RBX: 00007fa0bbfd8c90 RCX: 0000000000457ec9 [ 479.119854] RDX: 0000000000002761 RSI: 0000000020000200 RDI: ffffffffffffffff [ 479.127123] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 479.134561] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa0bbfd96d4 [ 479.141825] R13: 00000000004c3eaf R14: 00000000004d70a0 R15: 0000000000000003 23:07:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000180)=ANY=[@ANYBLOB="636f6d6d6974bd30786666666666666650d507256666666666666666392c001de1f9b6b0e9fdac8d21519fae2e6663b1fb977c1974c5bcac39b0dba811b2c940cfd3c968f677891a8ff07d7c1323c8ef9d73bf7dff2fe3ed6edf7766749c191f000000e8c65f"]) 23:07:32 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x40}, [{}]}, 0x78) 23:07:32 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:07:32 executing program 3 (fault-call:0 fault-nth:5): openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:32 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x40}, [{}]}, 0x78) [ 479.264659] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz [ 479.264659] =0x0000000000000000" or missing value 23:07:32 executing program 0: execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=[&(0x7f0000000040)='\x00', &(0x7f0000000080)='[selftrusted\x00', &(0x7f0000000140)=']mime_type\x00', &(0x7f0000000180)='system\x00', &(0x7f00000001c0)='keyringGPL\x00', &(0x7f0000000200)='GPLsystem)+\x00', &(0x7f0000000240)='keyring\x00', &(0x7f0000000280), &(0x7f00000002c0)='vmnet0\x00'], &(0x7f00000003c0)=[&(0x7f0000000380)='\x00']) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r0, 0xc028564d, &(0x7f0000001440)={0x2, 0x0, [0x6, 0x0, 0xc24, 0x6, 0x265, 0xcb2, 0x1, 0x4]}) bind$vsock_stream(r0, &(0x7f0000000400)={0x28, 0x0, 0x2711, @reserved}, 0x10) getdents64(r0, &(0x7f0000001480)=""/4096, 0x3c4) 23:07:32 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) [ 479.382625] EXT4-fs (sda1): Unrecognized mount option "commit˝0xfffffffPŐ%ffffffff9" or missing value 23:07:32 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x880000, 0x0, 0x40}, [{}]}, 0x78) [ 479.442916] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz [ 479.442916] =0x0000000000000000" or missing value 23:07:33 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/.roup.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:33 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:07:33 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x40}, [{}]}, 0x78) [ 479.589490] EXT4-fs (sda1): Unrecognized mount option "commit˝0xfffffffPŐ%ffffffff9" or missing value 23:07:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isiz%'}}, {@commit={'commit'}}]}) 23:07:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8, 0xa00) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000400}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r1, 0x1, 0x70bd29, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0xfff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000004}, 0x40880) 23:07:33 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x7, 0x800}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x26}}}}, 0x84) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:33 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='//roup.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) [ 479.844519] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz%=0x0000000000000000" or missing value 23:07:33 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.sockprotoname\x00', &(0x7f0000000080)=':posix_acl_access.ppp0\x00', 0x17, 0x3) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x101004, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000180)) 23:07:33 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x40}, [{}]}, 0x78) 23:07:33 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x02+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) [ 480.006102] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz%=0x0000000000000000" or missing value 23:07:33 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x40}, [{}]}, 0x78) 23:07:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isizv'}}, {@commit={'commit'}}]}) 23:07:33 executing program 0: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:07:33 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x200500, 0x0) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000200), &(0x7f0000000280)=0x4) syz_mount_image$iso9660(&(0x7f0000000240)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x5, 0x3, &(0x7f0000000500)=[{&(0x7f0000000300)="01308f3cb76f8f169fb2f2d7a1d8bc9aefa0a7891b5229d6e44cd8666cbc42e6b26f1b18a6aa39f0a334264a85961d1f89df2dc1eb35ff3057bb8e4e8e8d936a703c036d661a25363cc30d1e4117adf8e035dcf2ddfe82136923b6a0e7d22e5387ea44dc684851ff08d822398931d422989cb15f6c6a456462e9cd7e8c2ef0e48d98defc1f9c28", 0x87, 0x1ff}, {&(0x7f00000003c0), 0x0, 0x350}, {&(0x7f0000000400)="8b3b43368529f8150b3159b35ac96e137b90cf4db94aa9f025ad80019c7e3c524415e4fda616b4ee8ca1f8280b100100c7a67e2aed6d46028e69f4bc557bb7ca7ecc16f4420391e769193f9bad2757a4e4ce76075951581157dc38dbc1979308ff456e351b6ebc53ea1386597df7a3f5e1000287ce0c85adbdb08e561ebd7c0364ed6f1ef2305eac4ce03af7fb3a89ad8ca7393525385e3c8aaa0924274c136b24c3be45141d4f6dcc9ba1639b74cc71db8ed56b7659cae95c2dc1203192b9dfab90488f8c4dbc", 0xc7, 0x1ff}], 0x1010400, &(0x7f0000000580)={[{@overriderock='overriderockperm'}, {@sbsector={'sbsector', 0x3d, 0x3}}, {@check_strict='check=strict'}, {@unhide='unhide'}, {@sbsector={'sbsector', 0x3d, 0x4}}, {@dmode={'dmode', 0x3d, 0x3f}}, {@map_off='map=off'}], [{@subj_role={'subj_role', 0x3d, '/dev/dlm_plock\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/dlm_plock\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/audio\x00'}}, {@obj_role={'obj_role', 0x3d, '/dev/dlm_plock\x00'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@pcr={'pcr', 0x3d, 0x17}}, {@appraise='appraise'}, {@subj_user={'subj_user', 0x3d, '/dev/dlm_plock\x00'}}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB="636f6d6d8f74bbd609a6940927264d58f1d669743d307866666666"]) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2000, 0x0) recvfrom$rxrpc(r1, &(0x7f0000000140)=""/37, 0x25, 0x2000, &(0x7f0000000180)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @local}}, 0x24) 23:07:33 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x03+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:33 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x101002, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000040)={0x9, 0x0, 0x4, 0x1f, 0x0}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={r1, 0x3c, &(0x7f0000000140)=[@in6={0xa, 0x4e24, 0x2, @remote, 0x9}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x22}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}]}, &(0x7f00000001c0)=0x10) [ 480.273068] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isizv=0x0000000000000000" or missing value 23:07:33 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, 0x40}, [{}]}, 0x78) [ 480.416738] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isizv=0x0000000000000000" or missing value [ 480.590959] EXT4-fs (sda1): Unrecognized mount option "commŹt»Ö ¦” '&MXńÖit=0xffff" or missing value 23:07:34 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000040)={0x0, "544fbdec7c7199241817f5edfbbefdd2efd032620acd88384965c48a98fe0ae6", 0x3, 0x1}) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x1b) 23:07:34 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x04+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:34 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, 0x40}, [{}]}, 0x78) 23:07:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0xa}}, {@commit={'commit'}}]}) 23:07:34 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IMGETVERSION(r0, 0x80044942, &(0x7f0000000200)) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200440}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="01072bbf700003000000000000000000000000000000006280cf2463ff5a86f96d9af9fc4cb9aa49f48c0166ea3838f7cfbccf2df2daa13ee31ddc25e95223c679dddbdd646108560b5880198a3c619058ffd6e03b63aede869b4192f910d51b6ea88165421ac52b44d3e9f203092085286f0df5f87a96e1f69a812e37fd28b13780219030e41e74e71995fbc088f0acb6b9b1b0aaf7de38ff298388b7feafa0be18e5"], 0x1c}, 0x1, 0x0, 0x0, 0x20008801}, 0x20000000) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000240)=0x5, 0x4) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 23:07:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000180)=ANY=[@ANYBLOB="636f6d6d69740000666666666666666666392c0026420d83323a2852b9fb4c03c53817d7e9d66ac1849ba2120cc8d33d09124edc39f18386f5f0314ef91c283d5dbb1ef2197f313b4400000000000000"]) 23:07:34 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x06+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) [ 480.938823] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize [ 480.938823] 0x0000000000000000" or missing value 23:07:34 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x40}, [{}]}, 0x78) 23:07:34 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x840, 0x0) connect$unix(r0, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000000)='./file0\x00', r1, r2) 23:07:34 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) setsockopt$inet_dccp_int(r0, 0x21, 0x6, &(0x7f0000000080)=0xc7c, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) write$P9_RXATTRCREATE(r0, &(0x7f0000000040)={0x7, 0x21, 0x1}, 0x7) socketpair$unix(0x1, 0x202, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = getpgrp(0x0) ioctl$void(r0, 0x5450) write$cgroup_pid(r1, &(0x7f0000000000)=r3, 0x12) [ 481.024889] EXT4-fs (sda1): Unrecognized mount option "commit" or missing value [ 481.072099] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize [ 481.072099] 0x0000000000000000" or missing value 23:07:34 executing program 0: truncate(&(0x7f0000000000)='./file0\x00', 0x3) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:07:34 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x8000000002) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000000)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) 23:07:34 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x40}, [{}]}, 0x78) 23:07:34 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\f+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:34 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) 23:07:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x14}}, {@commit={'commit'}}]}) 23:07:34 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000180)={0x4, 0x8f, "7dc5cdcb157e5a177d6cefd63c1dbcc910d193764621711c2f223dd8209aeb302b13055c6d8c72e15659e30b2044e2381ab197d8b1841ca50cf92889d71a170f0b454db0975ae64cacbe1e26eefa2dd3b62d7bd5c890314bd8cfcf4d53b077bec63ec7dd81afbb600432a21ee96e0a13da8ae678e51d874178e1aab6630f6a398c2dacfa7cd0d2adca86074b514599"}) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000240)={0x0, 0xeb, "025409500c495f2d8af71ec315d6773c9d6afc1eeeeb94ef810208690ae174586f63fe07733058a78b6e6b7980a9843db6303b873743987e769bc895cd9a5761f808f3717de1bfebc853523ebb0a0631e3868570aea113db9b5c91eed79a9b364489a44a16d2447452c319609abc91e7e217090642719bab853ec238a040bfa191a149fb29222813abc831b846a01b5286e513a78b878b87893a69f4c81855fb54a32365a8fdf1eedc337352f79a6a75d6b5e923fadeca166dc85afac19a75051f6661b265e854da92de46ce680300aeb6898d2d8b31d0ad45504cea3c5fca0e77892ecd3068a2df81045e"}, &(0x7f0000000340)=0xf3) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000380)=@assoc_value={r1, 0x13}, 0x8) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@sha1={0x1, "c621ded20a8a4bca17355f34ee2d2625c9e48227"}, 0x15, 0x3) 23:07:34 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8040000, 0x0, 0x40}, [{}]}, 0x78) 23:07:34 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x12+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) [ 481.380711] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize0x0000000000000000" or missing value 23:07:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) 23:07:35 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\fJ{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:35 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x4, 0x400081) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000040)={0x0, 0x6, 0x301e, 0x1}) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:07:35 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8800000, 0x0, 0x40}, [{}]}, 0x78) [ 481.562286] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize0x0000000000000000" or missing value 23:07:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x25}}, {@commit={'commit'}}]}) 23:07:35 executing program 1: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x1) 23:07:35 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x0fJ{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:35 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x408001, 0x0) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000140)={&(0x7f0000ffc000/0x4000)=nil, 0x2, 0x0, 0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000080)={0x0, 0x6}, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_pid(r2, &(0x7f0000000000), 0xfffffea6) 23:07:35 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='./file0\x00') 23:07:35 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, 0x0, 0x40}, [{}]}, 0x78) 23:07:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x800000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='commit=0xfffffff&fffffff9,\x00']) 23:07:35 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x10J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x2d}}, {@commit={'commit'}}]}) 23:07:35 executing program 0: symlink(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x8000) r0 = syz_open_dev$cec(&(0x7f0000000340)='/dev/cec#\x00', 0x0, 0x2) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) utimensat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={{}, {0x0, 0x7530}}, 0x100) symlink(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') r2 = dup2(r1, 0xffffffffffffff9c) renameat2(r1, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000080)='./file0\x00', 0x2) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x1ffffd, 0x0) 23:07:35 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x40}, [{}]}, 0x78) 23:07:35 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\f\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:36 executing program 1: r0 = socket(0xa, 0x80007, 0x2) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000100)={0x0, 0x7b, "0579254709b56abb0eb3d4a899266b5b3588283a4526ff1b044e639de4dfccbdab0fc0cc8dae291a8c29c9b53469cbfc2f88ceaa061c18ebb0a16bbed0590c11e803618108c8d6076f64155634539bfc40c930ef007d14ceca8272dac62f9fe6cc51b3eef39f8fe6b3a73c908398b9babb8694724fce4b35bdd192"}, &(0x7f0000000040)=0x83) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000280)={r1, 0x3ff, 0x1}, &(0x7f00000002c0)=0x8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f00000001c0)=ANY=[@ANYBLOB="636f6d6d69743d3078666666666666666666666666666666392c00d514fa892790aa99682b575cdb9031a49fe2bd49daa93592a792971e5d354f44c546c8af4e03a080ba3f3a1d1309da58a9d3602b12984d45226e057f73f0c999ff54774378464776516fe13255686fca9bbc9c246edf7b389d2c71e4582e754a231aa8155dc5d167f3a728bd80cb183b4a7c3dc61a2ede80be8d548a5c78f46f428583cf742a4ca9efac"]) 23:07:36 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\x0f\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:36 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000, 0x0, 0x40}, [{}]}, 0x78) 23:07:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f00000001c0)={0x20c, r4, 0xa00, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x38, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x812}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_SOCK={0x40, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x342c00000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x19}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6bf}]}, @TIPC_NLA_BEARER={0x11c, 0x1, [@TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffff9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @local}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x97, @empty, 0x7f}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0xa416, @empty, 0x1ff}}, {0x14, 0x2, @in={0x2, 0x4e21, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x3f, @dev={0xfe, 0x80, [], 0x15}, 0x4}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x3, @ipv4={[], [], @empty}, 0x1}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'nlmon0\x00'}}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xf0a}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x400}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8cb}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x200}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100000000}]}]}, 0x20c}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fstat(r2, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 23:07:36 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000940)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001cc0)={0x0, @rand_addr, @multicast2}, &(0x7f0000001d00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001d40)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000001e40)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000001e80)={@loopback, @initdev, 0x0}, &(0x7f0000001ec0)=0xc) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000006a80)={&(0x7f0000003640)=@can={0x1d, 0x0}, 0x80, &(0x7f0000005a00)=[{&(0x7f00000036c0)=""/4096, 0x1000}, {&(0x7f00000046c0)=""/4096, 0x1000}, {&(0x7f00000056c0)=""/214, 0xd6}, {&(0x7f00000057c0)=""/44, 0x2c}, {&(0x7f0000005800)=""/141, 0x8d}, {&(0x7f00000058c0)=""/128, 0x80}, {&(0x7f0000005940)=""/160, 0xa0}], 0x7, &(0x7f0000005a80)=""/4096, 0x1000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006ac0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000006bc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000006c80)={'ip6gretap0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000c8c0)={{{@in6=@ipv4={[], [], @initdev}, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6}}, &(0x7f000000c9c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000012cc0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000012dc0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000012e00)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000012f00)=0x7c) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f00000133c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2001}, 0xc, &(0x7f0000013380)={&(0x7f0000012f40)={0x41c, r1, 0x4, 0x70bd25, 0x25dfdbfd, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffa3a7}}}]}}, {{0x8, 0x1, r3}, {0x240, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xee}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r4}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x401}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x71b800, 0x1, 0xfffffffffffffffd, 0x6}, {0x7f, 0xfffffffffffffffe, 0x8, 0xe57}, {0x7, 0xffff, 0xedc, 0x8}, {0x1, 0x7fff, 0x5, 0x7fff}, {0x101, 0x101, 0x1, 0x8000}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r7}}}]}}, {{0x8, 0x1, r8}, {0xe8, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffff}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}]}}, {{0x8}, {0x40, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}]}}, {{0x8, 0x1, r12}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}]}, 0x41c}, 0x1, 0x0, 0x0, 0x800}, 0x20008001) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x42000, 0x0) 23:07:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3b}}, {@commit={'commit'}}]}) 23:07:36 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\x10\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:36 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x223c0200, 0x0, 0x40}, [{}]}, 0x78) 23:07:36 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x0f\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:36 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='./file0\x00') 23:07:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)) 23:07:36 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000, 0x0, 0x40}, [{}]}, 0x78) 23:07:36 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') getrlimit(0xf, &(0x7f0000000000)) 23:07:36 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x10\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x76}}, {@commit={'commit'}}]}) 23:07:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='cgroup.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r0, &(0x7f00000001c0)={'#! ', './file0', [{0x20, 'cgroup.events\x00'}, {0x20, 'memory.events\x00'}, {0x20, '+wlan0em1selinuxselinux}-proc\xbbmd5sum'}, {0x20, 'nodevsystemeth1\\keyring'}, {0x20, 'vmnet1:'}, {0x20, 'memory.events\x00'}], 0xa, "f78bb6d39f7922a1d6d00590b928ee32aaa61c95b58bee80a3e6522c72d41c53e9340b2e6904be016cd4592d38309608da776886a0ba594a3b216eb5b94c35f1ae85ce5152b34bcff325bed36aaa52ee6f41b95518fde53a367fd38a6adc15653ff3bfae0c0502bc722964922699c7cba70b63e4b9f54f23517374896852aab5f975c9fab9b48da3dc4d585e9b18da021783db145084aff3c435a34b"}, 0x119) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 23:07:37 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x04t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:37 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)='./file0\x00') getgroups(0x4, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) r1 = geteuid() syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xffffffff, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000140)="9e77f8f3c46f5db9e86df6683583f049b782aa12892b1b7a0ad449d749708c0be86f4bf7b633e8d88a7c828298e1ed9796ffdf7e0faf018303737cf67e58741ed493a0cbdbae6a7e56bd862c04bca0a5b79faba165645df39c47e7af6369a69cbe9dc69191548d836f76dba64664697e5810fcd22ac78e059a437978b088b3ef2179bd335bb3f97f8e79127b94d6f8f3674594a9d247dcc67147d7b086caafd19c842a6d6fac6f77881ab04d240c64ed8b3d1346", 0xb4, 0x8}, {&(0x7f0000000200)="3a14ef7930cde3ab4aa672ed03786c32d2bebba63d47d199f0d6b23168146fca194d25c5276a00f2d2e39965e3d66849dc6b4394c575d4839dcda5729413ecc51e1ee37ca5999fd71d7f7314e0a1c0381bada2804e2de9b27629e72c45f40679be217c02657327e4", 0x68, 0x8000}, {&(0x7f0000000080)="c1c09d2aaa88819619517077e16d984d0cf2b9aaf4b42b7478029e610b8be37c5dcf3354c224be7040bfc60c538c3d82e561bffb7c2551", 0x3e, 0x587}, {&(0x7f0000000280)="95fe181a0ce26afeba7c290c3bc2bb1ea2dba86ecc439152736d3b7be367b715aa534f2df51267f70dfbb0cbc832", 0x2e, 0x1}], 0x80000, &(0x7f0000000440)={[{@resize_size={'resize'}}, {@usrquota='usrquota'}, {@gid={'gid', 0x3d, r0}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'gid'}}, {@dont_measure='dont_measure'}, {@appraise='appraise'}, {@pcr={'pcr', 0x3d, 0x1}}, {@uid_gt={'uid>', r1}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x3a, 0x62, 0x34, 0x62, 0x32, 0x76, 0x65], 0x2d, [0x0, 0x61, 0x63, 0x37], 0x2d, [0x64, 0x30, 0x7f, 0x77], 0x2d, [0x3d, 0x35, 0x77, 0x31], 0x2d, [0x73, 0x38, 0x39, 0x30, 0x77, 0x63, 0x32]}}}]}) 23:07:37 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78000000, 0x0, 0x40}, [{}]}, 0x78) 23:07:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) prctl$PR_GET_DUMPABLE(0x3) 23:07:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2}}, {@commit={'commit'}}]}) 23:07:37 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\ft\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:37 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4ffffff, 0x0, 0x40}, [{}]}, 0x78) 23:07:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) writev(r1, &(0x7f0000000040)=[{&(0x7f00000001c0)="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", 0xff}, {&(0x7f00000002c0)="ee9b1b741419208ff89246c280d2bd42556a83d00c112e22b1271e0f5cbfab3dd7522432f61ada2854f34982632eff2a7b72030ae6e6451bae7b36f7a62356dc8ff2681954b92834f55b50cebfba1d3b5885132c13fc0fee60d27c155fd339e2312da13ed763db80a5a80f6dca8fef369d1c11130502307d52e31d35c39c2141d00aed29eab7a1c87dbb0227bf1e721c64cb294bef77d3d7f8eb89ba068b8ac118aa5063988090c29f389d8030fce7b3d9614f407f506b67910c18776c72999a077172104bf4a8e13e04287f99c5cadc38db992ecdaac8b9645e338c54cebd5153d0f98a9c59124bd186db4dd9beb185bc893e61e1a15e0c8ccfaaf4482ae1", 0xff}, {&(0x7f00000003c0)="1984e75bf2a9a2f30408011882ccdc04015b68d3c82c94fb4eb8ece464e3db1c362bdb70f5e717014b6f82d048139081081da8c01493dce29725d0bc8d9a4355751b8ec1fa96a05e6ffa2d4a6f6a1b03b72484a9e98b4402414fcdfed5bd97bc870380ef2e456808fcd3f4b525f2bb47311387c80325f1629d4923f5e02282469cbabb6ff52d45dde08ea9305f1d32ab07db8eed56da0ccfdb2e913ee3becd1d389ff99aee2d01b8c3c8a917eebba49abea81859bea696a95e719bdbb6", 0xbd}, {&(0x7f0000000480)="aff03f6b04d93303eb9f1f4c8e686ace02f0ef26e43297050839a565b94c8d7f65d6810e1d7f4fc0bc408ce1cc5ba5e7dacb0d7fdd967d89e2f0afa14a9b38057cd7f9a9b947842c6b17fd290864712b63f096130f09507ea777a66b7d4012209da0f5b834675eb57bc34805079ed48b4126b6868723782ab99c6b4f409c6042dddb2a6299986edd05033397d7f8c558fc16b81f66085f72dfb5f38f495d053778cc3ea538e21d8ac4c121", 0xab}], 0x4) 23:07:37 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x0ft\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:37 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400000, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000040)=0x3, 0x4) 23:07:37 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) munmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000) 23:07:37 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x1, 0x40000) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000140)={'security\x00'}, &(0x7f00000001c0)=0x54) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') 23:07:37 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x10t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 23:07:37 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff, 0x0, 0x40}, [{}]}, 0x78) 23:07:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f00000001c0)={0xd, @sdr={0x50424752, 0x7fff}}) 23:07:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}, {@commit={'commit'}}]}) 23:07:37 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\xe0t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:37 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200000, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000080)="f32ed1e8337ccff2f5f8a59f525afd80", 0x10) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x800) r1 = shmget$private(0x0, 0x2000, 0x78001000, &(0x7f0000ffe000/0x2000)=nil) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x6b461911}, &(0x7f0000000180)=0x8) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000001240)={0x8, 0xfffffffffffffffb, 0x43a40ae5, 0x4, 0x10001, 0x1}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000012c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000001380)={&(0x7f0000001280), 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x2c, r3, 0x20, 0x70bd29, 0x25dfdbfb, {{}, 0x0, 0x4107, 0x0, {0x10, 0x18, {0x8, @bearer=@l2={'eth', 0x3a, 'eql\x00'}}}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)={r2, 0x1000, "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"}, &(0x7f0000001200)=0x1008) shmctl$SHM_LOCK(r1, 0xb) 23:07:37 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff010000, 0x0, 0x40}, [{}]}, 0x78) 23:07:37 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f0000, 0x0, 0x40}, [{}]}, 0x78) 23:07:37 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\f\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:37 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x100, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x0, 0xfff, 0x6}) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='./file1\x00') 23:07:38 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\x0f\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:38 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f, 0x0, 0x40}, [{}]}, 0x78) 23:07:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x100000000, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) 23:07:38 executing program 0: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) openat(r0, &(0x7f0000000040)='./file0\x00', 0x101000, 0x100) 23:07:38 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\x10\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:38 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff4, 0x0, 0x40}, [{}]}, 0x78) 23:07:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x4}}, {@commit={'commit'}}]}) 23:07:38 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x200000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000340)={0x5, 0x10, 0xfa00, {&(0x7f0000000140), r1, 0x2}}, 0x18) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 23:07:38 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.stat\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 23:07:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x2, 0x220000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="7d000000d46b3cd508a75590ef1808c40f12d00000000000009e1818d94b4f41d87d54a186f726618505f2fb30ecafd1ed249e3fee9ce7d86a715029f5b9d8aa5cfee98ce46b7d520089725c878ba5190dd9b410cca39d58c5792e2d1cf72047d984dbbf17715fa3516b0f3458f4e6dfa5454317e7166caaf21c99f10f279f0a1f6dce5809dfa491c98d30b6d80948cf4c6a429ed1b3205fbe1bad54cfb055d50b1d2873631e036f0bda53dd33c13621"], &(0x7f0000000240)=0x85) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000280)={r1, 0x3941}, 0x8) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) 23:07:38 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x6b, 0x80000) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000240)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000280)={'team0\x00', 0x0}) getpeername$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @empty}, &(0x7f0000000380)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000580)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000540)={&(0x7f00000003c0)={0x154, r1, 0x8, 0x70bd27, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xfff}}}]}}, {{0x8, 0x1, r3}, {0xf4, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xff}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r5}}}]}}]}, 0x154}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) r6 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000640)={0x0, @multicast1, @dev}, &(0x7f0000000600)=0x164) setsockopt$IP_VS_SO_SET_EDITDEST(r6, 0x0, 0x489, &(0x7f00000000c0)={{0xc, @empty, 0x4e24, 0x0, 'nq\x00', 0xc, 0xe70, 0x3a}, {@broadcast, 0x4e23, 0x12003, 0x8, 0x8, 0x8}}, 0x44) sysfs$2(0x2, 0x1f, &(0x7f0000000000)=""/170) 23:07:38 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\f\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) [ 485.452751] EXT4-fs: 14 callbacks suppressed [ 485.452764] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000004,commit=0x0000000000000000, 23:07:38 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x40}, [{}]}, 0x78) 23:07:38 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000040), &(0x7f0000000080)=0x40) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f00000001c0)=""/194) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000140)=0x4) 23:07:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000180)=ANY=[@ANYBLOB="636f6d6d69743d307866661f0066666666666666666666392c000004b3236bf488b631fa1769e5eeb91fe77a9b22d53411ada55c4e6be179c643bf5ec2c1c965c2"]) 23:07:39 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:07:39 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x0f\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) [ 485.616611] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000004,commit=0x0000000000000000, 23:07:39 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@sha1={0x1, "5456af4248bcbef10f1167608702c0af1239dece"}, 0x15, 0x1) [ 485.704038] EXT4-fs (sda1): Unrecognized mount option "commit=0xff" or missing value 23:07:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5}}, {@commit={'commit'}}]}) 23:07:39 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff000, 0x0, 0x40}, [{}]}, 0x78) 23:07:39 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x10\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:39 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='./file0\x00') 23:07:39 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800800000000, 0x0, 0x40}, [{}]}, 0x78) [ 485.916116] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000005,commit=0x0000000000000000, 23:07:39 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x0f\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:39 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x13f, 0x7}}, 0x20) lsetxattr$security_smack_transmute(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='security.SMACK64TRANSMUTE\x00', &(0x7f00000002c0)='TRUE', 0x4, 0x2) [ 485.962284] EXT4-fs (sda1): Unrecognized mount option "commit=0xff" or missing value [ 486.144248] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000005,commit=0x0000000000000000, 23:07:40 executing program 2: syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:40 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x40}, [{}]}, 0x78) 23:07:40 executing program 1: r0 = accept(0xffffffffffffff9c, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000000540)=0x80) sendmsg$nl_route(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=@ipv4_getrule={0x20, 0x22, 0x2, 0x70bd27, 0x25dfdbfc, {0x2, 0x0, 0x94, 0x800, 0x8, 0x0, 0x0, 0x7, 0x4}, ["", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20040004) mkdir(&(0x7f0000000180)='./file0\x00', 0x800000000004) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f00000004c0)=0x2, &(0x7f0000000500)=0x2) r2 = syz_open_dev$amidi(&(0x7f0000000440)='/dev/amidi#\x00', 0x7, 0x30040) write$FUSE_BMAP(r2, &(0x7f0000000480)={0x18, 0xffffffffffffffff, 0x2, {0x401}}, 0x18) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xffffffffffffff00, 0x101000) ioctl$KVM_SET_DEBUGREGS(r3, 0x4080aea2, &(0x7f00000001c0)={[0x0, 0x2000, 0x10000, 0x5000], 0x6a, 0x41}) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.ima\x00', &(0x7f0000000240)=@ng={0x4, 0x1, "3f3c88b25ab9f7fcd8be2b916ec62c020c6b"}, 0x14, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000300)={'nlmon0\x00', @random="c861c2f59428"}) 23:07:40 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffff9c, 0x0, 0x13, &(0x7f0000000080)='/dev/btrfs-control\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)=r0, 0x4) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x16c80, 0x0) timerfd_create(0x8, 0x800) setsockopt$llc_int(r1, 0x10c, 0xf, &(0x7f0000000040)=0x92, 0x4) 23:07:40 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x10\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6}}, {@commit={'commit'}}]}) 23:07:40 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x02\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:40 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '/trustedsystem:\\\x88)GPL:em1\x00'}, &(0x7f0000000080)=""/42, 0x2a) 23:07:40 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x40}, [{}]}, 0x78) [ 486.752133] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000006,commit=0x0000000000000000, [ 486.872856] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000006,commit=0x0000000000000000, 23:07:40 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x03\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:40 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$btrfs(&(0x7f0000000280)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x6, 0x8, &(0x7f0000000740)=[{&(0x7f0000000300)="6f7365e1b31975287dfb9ffcf5aef25eb110270befe933185b53754c8272cf16326b337c25962a6d353f4f519bd3f84c644a53a8a30f509ae6d1cfbcd4b88f966b5aa5d3b11d2943da407a4e29f6bd062a69a4cf5eb118b65a5e8e491ee2d2fb22190fd614cc92fb", 0x68, 0x4a73b306}, {&(0x7f0000000380)="4988f30fcadf0abd01925b8a", 0xc, 0x2b0}, {&(0x7f00000003c0)="78518db5183974b4f74afd50a4ac96cd5e680b83f33aa7dd849b68b43c5f115f40c201c9ba7e98799e73feaff45c03773b473febf1206131dd8cf6cc07fe1f672626899d8c1895796e5b9f074b1b1ea99b509faef1fba0ecece94ac41c35c86118640ff23eb94940876c3c3739df808d16ca08ac13768e7bbceba37305f4267d00467176302dfab154d4ce16f15eb3db2a61f58893c91ebf5dd0ee58d7cf1c362011afe90bf408e94d7447ca7a11b872f4c22f72a2ed2619eccadbca", 0xbc, 0x80000001}, {&(0x7f0000000480)="f425b4b91e925b3e48085d8d2039bea5da90eccf3fa89d629198e2a8a2b6735152b6c31b29f570a442b5d28e6daa5bf107b646d4c215723094515900a83df740f1523d2f4bc4bb73992523a27030ec48c058fb89979056", 0x57, 0x7fffffff}, {&(0x7f0000000500)="ef6ba8c74b7d0ce03650a468a27ca1730a2441c8624d61bab348e4f6d55a91397a3781f25657016d382b71e9660f550416a2d85a20410f55768ac382d29eedf62593fa5918", 0x45, 0x8}, {&(0x7f0000000580)="15f15d9655e5c191f7e39cd4b528acf4d9db5da80a5b245660e81d2d024ae3026c879520224ac1309b58446d51dfe522b3c5d31300d5ea15c6427d8d72d97ea83c7f2bcf503632cc79e6bb9fd14df68aed23dd0f57a3f2f666dfd338bf63454968c2ee18c063991a9ad1acd166c503fd8916e7b0048ca013db2e91d07aeceb57f42528", 0x83, 0x101fd0ca}, {&(0x7f0000000640)="f422df097e543d6c009a7d6524c3ca7b2328bc7df587d75cace302fde2e4b774659df09927a94eebc29f59f6426ee77227a737ad52b2401184b79e604a9edbd59327803195787a4bc44e11eb4070859253a1f867b61b8d57f0dee8111688dff4a4c2761c278e78cb99235871e6bbeb44e82b8e5592289d", 0x77, 0x6a39}, {&(0x7f00000006c0)="85dfabdb2fce84358fa6d7f8d82c64f433c4cc7d0a3c38b14d2def1c4c6a700a8b0a14adb69cb81cd0a3a45f8bfa7b35c162b6cfb3ecc1d35f8a5eb356d4f2e2b82fbde41890bd9e09b11f9b1f5e63c0929937549ed25fde9ad9e5c75f3c638bbbdff21c1271b86ee9b1c30a8442f065f312a9b1cfc4e97102340660edb1", 0x7e, 0x8000}], 0x8, &(0x7f0000000800)={[{@datasum='datasum'}, {@acl='acl'}], [{@seclabel='seclabel'}]}) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000040)='./file0\x00', 0x72b2, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="f90fe6998f7623d7f02a264362efdf3f93210828a7a1428e219e7ff5ae95c7e8529267c4b8da9db1e5f7df5f92a81f86d5a04658df731c81203006d3c1fc3001eac7e1a32cf9f0920862ba9faa50a6a84ec3d9620bbeece07f9913514e89171fc079ca0aa1312c528140e8cc66898a42e1b2e66f4d2a6fa4d9364e4e4734985a6d2c70bae0511ff222fd8c4da4162b77516f765f9c7b482c67c31055fcf6e495dba3fd79bafd56bc856c4123a9f21cc77f46837557608131468863dd8a6c0ccc5568718f349a0a", 0xc7, 0x1fa3}], 0x40, &(0x7f0000000240)='trusted\x00') 23:07:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7}}, {@commit={'commit'}}]}) [ 487.084009] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000007,commit=0x0000000000000000, 23:07:41 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x6, 0x8}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000100)={r2, 0x80000001}, 0x8) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x0, 0x8, 0x0, [], [{0xff, 0xffffffffffffb3e4, 0x6, 0x4, 0x9, 0x7f}, {0x80000001, 0x100000001, 0x7, 0x1, 0x1ff, 0x7f}], [[], [], [], [], [], [], [], []]}) 23:07:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rpc\x00') sendto$netrom(r0, &(0x7f0000000140)="17d79df79a758ef58ec5a4a4723b4426902d4ee481cbca41cf63a7cadac4837deecc0d2c9b7f5b2f240b6f8de47084ff7202b02559a62a8ab9ae110e87d6e854442eeebc20a989c0ffbd182776a49e81f3d3812fd7d23f0a13c9573a3a9f1b6845807fdfa2bf0ff083bfe4ff4d2ff668e61cb7d324fce9d54b8e4b53d595838836c2b49c6b46a87849f4013f400f20a960e403ab728961a7c48d692714b80505e74f6fdb6e42d9aafd26fabda2c7cc70b416a9137427f67cfb562fd2ca75e21b4c77ca4f7bac26def255e3a81f610b2943abc80ad93c298d8dc9", 0xda, 0x4, &(0x7f0000000240)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) 23:07:41 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88000000000000, 0x0, 0x40}, [{}]}, 0x78) 23:07:41 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x04\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:41 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') chdir(&(0x7f0000000000)='./file0\x00') 23:07:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x8}}, {@commit={'commit'}}]}) 23:07:41 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x402803, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000040)={0x1, 0x9, 0xc79, 0x200}, 0x10) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:07:41 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff0f0000, 0x0, 0x40}, [{}]}, 0x78) 23:07:41 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x06\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) [ 487.804387] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000008,commit=0x0000000000000000, 23:07:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x9}}, {@commit={'commit'}}]}) 23:07:41 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x10480, 0x0) write$P9_RATTACH(r0, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x8, 0x3, 0x7}}, 0x14) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000040)={0x0, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e23, @remote}, {0x2, 0x4e21, @multicast1}, 0x8c, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x1}) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f00000001c0)) 23:07:41 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\f\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) ioctl$SIOCRSACCEPT(r0, 0x89e3) 23:07:42 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x40}, [{}]}, 0x78) 23:07:42 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x12\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:42 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x20080) clock_gettime(0x0, &(0x7f0000003740)={0x0, 0x0}) recvmmsg(r0, &(0x7f00000035c0)=[{{&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)=""/192, 0xc0}], 0x1, &(0x7f0000000240)=""/231, 0xe7}, 0x7ff}, {{&(0x7f0000000340)=@x25, 0x80, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/100, 0x64}, {&(0x7f0000001440)=""/199, 0xc7}, {&(0x7f0000001540)=""/134, 0x86}, {&(0x7f0000001600)=""/175, 0xaf}, {&(0x7f00000016c0)=""/193, 0xc1}, {&(0x7f00000017c0)=""/107, 0x6b}, {&(0x7f0000001840)=""/124, 0x7c}], 0x8, &(0x7f0000001940)=""/83, 0x53}, 0x6}, {{0x0, 0x0, &(0x7f0000002d80)=[{&(0x7f00000019c0)=""/15, 0xf}, {&(0x7f0000001a00)=""/46, 0x2e}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000002a40)=""/191, 0xbf}, {&(0x7f0000002b00)=""/128, 0x80}, {&(0x7f0000002b80)=""/161, 0xa1}, {&(0x7f0000002c40)=""/120, 0x78}, {&(0x7f0000002cc0)=""/149, 0x95}], 0x8}, 0x9}, {{&(0x7f0000002e00)=@generic, 0x80, &(0x7f0000002f00)=[{&(0x7f0000002e80)=""/68, 0x44}], 0x1, &(0x7f0000002f40)=""/151, 0x97}, 0x3}, {{0x0, 0x0, &(0x7f0000003380)=[{&(0x7f0000003000)=""/133, 0x85}, {&(0x7f00000030c0)=""/41, 0x29}, {&(0x7f0000003100)=""/197, 0xc5}, {&(0x7f0000003200)=""/168, 0xa8}, {&(0x7f00000032c0)=""/73, 0x49}, {&(0x7f0000003340)=""/10, 0xa}], 0x6, &(0x7f0000003400)=""/8, 0x8}, 0x1f}, {{&(0x7f0000003440)=@ll, 0x80, &(0x7f0000003540)=[{&(0x7f00000034c0)=""/26, 0x1a}, {&(0x7f0000003500)=""/56, 0x38}], 0x2, &(0x7f0000003580)=""/36, 0x24}, 0x7f}], 0x6, 0x2, &(0x7f0000003780)={r1, r2+10000000}) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000037c0)='/dev/dlm-control\x00', 0x210201, 0x0) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$SCSI_IOCTL_TEST_UNIT_READY(r3, 0x2) 23:07:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x40084, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) 23:07:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa}}, {@commit={'commit'}}]}) 23:07:42 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x03\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:42 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x40}, [{}]}, 0x78) 23:07:42 executing program 0: symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4, 0x1) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f00000000c0)={0x7, 0x8}) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000140)="417087f6eab14e49459be45fd37a0ba266d7f6df7a4308a7c4c8e39b9c90dde77ff1f5e14d0eb15b599e5e0228c08700686e4b7ee77375edb5d45452824dcbdb27feb6b01ef072f86a8dab0f659f2505e196d997488d38391233174d2c4e12793a16c711101c27fd9d9421f94e0aa2f21183ffd46e4be8998f11e01e7a2c1e6c6b72720607b48f625f2db4e4e156069e45702d08764c51cb3739b484ceef28ed20a239b7fb223728c6d7fb9b70ff2295b6bbaab660fad2e60e3ba300759b6f974ebf230c19e524e674b0755126987836ed1c47ee8fab5aa480cb24528c750815239188dec1c6ab77c8eac137064952928a2ccf") 23:07:42 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x40}, [{}]}, 0x78) 23:07:42 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x06\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x10}}, {@commit={'commit'}}]}) 23:07:43 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:43 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x21) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_settime(0x1, &(0x7f0000000140)={r0, r1+30000000}) 23:07:43 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\f\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:43 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') chmod(&(0x7f0000000000)='./file0\x00', 0x84) 23:07:43 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000, 0x0, 0x40}, [{}]}, 0x78) 23:07:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x14}}, {@commit={'commit'}}]}) 23:07:43 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000, 0x0, 0x40}, [{}]}, 0x78) 23:07:43 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x12\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:43 executing program 0: syz_mount_image$vfat(&(0x7f00000004c0)='vfat\x00', &(0x7f0000000500)='./file0/../file0\x00', 0x7, 0xa, &(0x7f0000000c40)=[{&(0x7f0000000540)="6b548c16749b648e0389ba13d787c3e420deee0a084954a2c2e934ffecc037ab73d5ea07cc01081081caaf6904ac1a914562f2", 0x33, 0xfffffffffffffff8}, {&(0x7f0000000580)="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", 0xfe, 0x1}, {&(0x7f0000000680)="41bbb4193095719bab82f88eae699ec3283ec7423f9d13929221f63d49e58b689e06153c0f111bc54774985901484cf6ed2568b504b44c50bf7ce06fa94c823d69217fad08079da4d3756e94545cf32cd90cbf7895891193c41592485021bd1e12e3884ca9458957d6099ba6624186dddd4cfc9ae5be2089bd24567f91b138a5a491066ffed7d610b9bc66d8ef86", 0x8e, 0x7}, {&(0x7f0000000740)="3242e9225c25646230b7c8f23fcea5d59018d1f25104e5cb71cac9b01e39a69bf5e1f03e07b88b69738d59ac4f6a6c16b1", 0x31, 0x20}, {&(0x7f0000000780)="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", 0xff, 0x3}, {&(0x7f0000000880)="3d185efd3109e6afc58049dada09a6b191a39bb4f0de1f35a7816523c481aca806166888d92cc51242130424448fb173e5d050cb5162e6916fd307544504cebbd23739f925f22eccbfb3e3739f64df831dde74ca067513c5a89f092af10f5ad868295c525d026bdd739686c8c1ec1b48656e124a4e126e43c17fdad7a237d0704f649473f237340daf521f835475ea325a51425ba7", 0x95, 0x9d0a}, {&(0x7f0000000940)="89971ecca17ee1b3e75a73081183b758f0aaa7a3f867c108146082afe996c528283a92c9f37997e3c7e7b5f5264ba1a17df05369f1974ab9c35df567dbcaa124ba1bd204d1082012084ac1009cb9c0cdb249083ba1c7e1f551c94682a6bf85a799b0c107c690b39f372bdf9455e5f3b36b4ed21b640af96d1d0bec0b00eb3bd8f47bc5f8da544150ec7073a5f16a573cc1d709ba8dbff836dc0bc4235eea2aa655d50f5784ddcc5a1ec88057bfb11b7facad374ba9b863c9cb6d0a6f5be36c1fbb3347137421bc82262764ea69a983cbcf8d50834573ff421c4c80052ae715ffc43a313bcef2c80d1ecfb51233db9b8771", 0xf1, 0x4}, {&(0x7f0000000a40)="7d58f701a5", 0x5}, {&(0x7f0000000a80)="00de15b183387396a2a3b0b91da0b36b016f43ee7d93a100192f0a1b0ccd5824177d82fafbd42c59dc1e4cd3ecf75501aed8955bc08f8711afc3335839569f25e16e26e272d1ff843d2f40a6af64c6139c9e6412e70b4709a8e38ea52de1a916fb618f4b8adb4a27431a9b707ae7c4cbf55ed55ceb0bd37d2defc53f345fd1d511c1d92a8978273e179b93c3e6e2b985c8ca9f6d000983", 0x97, 0x5}, {&(0x7f0000000b40)="de2a394189e49f13b6e8c3476451ab3845207972dc52952117f64c9a4658980baa68559068294a1547e4790194fdc356e838f2945663038c4b296c165289e2381629af0b8542562171c494db5bfad01406839eb58337e12523fa1701976dbeabd9c464b24989b860cb966685ef5e2e732b240c13a4be508d6264a5fc7c18e379f3116e6d4cb684045c63ec34786f891f18a63685c1437ad6abce91ad8f9c38816b4739e2e644ade012db8699f58ea97bb246850755543d541e67575320ca3dcd3168917e524c6c5b14588d603c7f4fd584a27ebc6aa3ab0d8b33bd0943c3ab0db0b8448d419d43a001f9c8cf91422f87c8c2", 0xf2, 0xf}], 0x10, &(0x7f0000000d40)={[{@shortname_mixed='shortname=mixed'}, {@shortname_mixed='shortname=mixed'}], [{@audit='audit'}, {@seclabel='seclabel'}, {@smackfsroot={'smackfsroot', 0x3d, 'lo'}}, {@obj_user={'obj_user'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000240)=0xe8) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000dc0)='/proc/capi/capi20ncci\x00', 0x100, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000e00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) mount$9p_rdma(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=rdma,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}, {@sq={'sq', 0x3d, 0x7fff}}, {@common=@fscache='fscache'}, {@common=@mmap='mmap'}, {@sq={'sq', 0x3d, 0x5}}], [{@subj_user={'subj_user', 0x3d, '\\em0cpuset'}}, {@euid_gt={'euid>', r0}}, {@obj_user={'obj_user'}}, {@uid_gt={'uid>', r2}}, {@smackfsroot={'smackfsroot', 0x3d, '@(mime_type.selinuxself@$+cpuset'}}, {@seclabel='seclabel'}]}}) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:07:43 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000, 0x0, 0x40}, [{}]}, 0x78) 23:07:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000140)={0x0, 0x62, "45888cfdc6efc252c444374541e6f0320f0ae2318c3607eb8882cca865486a52ec5f27bafb229144df7e235f98c80331078ea5a5d6f3559188f18651d06aa6a5771b875b924531b24ff889f2529d56849dad771a7d278ef3edb466493c4e63516c3b"}, &(0x7f00000001c0)=0x6a) readlinkat(r0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=""/86, 0x56) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000200)={r1, @in6={{0xa, 0x4e20, 0x7fff, @mcast2, 0x6}}}, 0x84) 23:07:43 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00 \x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:44 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x1000000000400200) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000040)={0x400, 0x0, 0x0, 0x18}) getsockopt$sock_int(r1, 0x1, 0x2b, &(0x7f0000000380), &(0x7f00000003c0)=0x4) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f0000000080)={0x5, r2}) socket$inet_tcp(0x2, 0x1, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f00000001c0)) timerfd_gettime(r1, &(0x7f0000000340)) ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x8934, &(0x7f0000000140)={'nlmon0\x00', 0x20}) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000280)=0x5) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000002c0), &(0x7f0000000300)=0x8) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000200)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7fffffff) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000240)={0x8, 0x100, 0x5, {0x1, 0xf2, 0x3, 0x5}}) 23:07:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2d}}, {@commit={'commit'}}]}) 23:07:44 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x40}, [{}]}, 0x78) 23:07:44 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\" \x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:44 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xc0000, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000380)={0x13, 0x10, 0xfa00, {&(0x7f0000000140), r1, 0x1}}, 0x18) r2 = socket$inet6(0xa, 0xa, 0x5) ioctl$VIDIOC_S_OUTPUT(r0, 0xc004562f, &(0x7f00000003c0)=0x300000000000000) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000000)={0x3ff, 0x7, 0x6, 0x2}, 0x8) 23:07:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) 23:07:44 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x804000000000000, 0x0, 0x40}, [{}]}, 0x78) 23:07:44 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06 \"\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) [ 490.992070] EXT4-fs: 9 callbacks suppressed [ 490.992082] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000002d,commit=0x0000000000000000, 23:07:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_smack_entry(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='security.SMACK64\x00', &(0x7f0000000180)='commit', 0x6, 0x2) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) 23:07:44 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0xb68) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x30402, 0x0) 23:07:44 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000, 0x0, 0x40}, [{}]}, 0x78) [ 491.134533] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000002d,commit=0x0000000000000000, 23:07:44 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00?\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f0000000080)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000001c0)={r3, @in={{0x2, 0x4e24, @empty}}, 0x0, 0x2, 0x8, 0x6, 0x7}, &(0x7f0000000100)=0x98) fsetxattr$security_smack_transmute(r1, &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000280)='TRUE', 0x4, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3b}}, {@commit={'commit'}}]}) 23:07:45 executing program 0: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) write$input_event(r0, &(0x7f00000000c0)={{0x77359400}, 0x17, 0xd4, 0x8bd}, 0x18) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') 23:07:45 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x40}, [{}]}, 0x78) 23:07:45 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x0f\xff\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) 23:07:45 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x02\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:45 executing program 0: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') socketpair$unix(0x1, 0x2002, 0x0, &(0x7f0000000040)) 23:07:45 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200000000000000, 0x0, 0x40}, [{}]}, 0x78) [ 492.082200] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000003b,commit=0x0000000000000000, 23:07:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) [ 492.213828] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000003b,commit=0x0000000000000000, 23:07:45 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x03\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='commit=0xf\x00fffffffffffff9,\x00']) 23:07:45 executing program 0: symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:07:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x48}}, {@commit={'commit'}}]}) 23:07:45 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x223c020000000000, 0x0, 0x40}, [{}]}, 0x78) [ 492.463571] EXT4-fs (sda1): re-mounted. Opts: commit=0xf 23:07:45 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x04\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) [ 492.559645] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000048,commit=0x0000000000000000, 23:07:46 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x80000001, 0x82) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000140)) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x8, 0x2, 0x9}) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) 23:07:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000140)='./file0\x00', 0x3f, 0x3, &(0x7f0000000400)=[{&(0x7f0000000180)="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", 0xfa, 0x5}, {&(0x7f0000000280)="c8bdadb807b4777e2888d3ec8408802f927a6a0baf806b0ea7339a12bd316d29274686ac701502950efb7c7fee301aa4a46f7def0b03b06e6d04de03254c953e1d89307a63ec4ddf22965bfbd49982988142facc219ac3040d662ffc2950cccf826b406bbcbbc2883a44272eceb796155d06e9bc3d008718c5f149", 0x7b, 0x9}, {&(0x7f0000000300)="1ded958b00dee3c78e110bde0f647880e295a60cec2c7b7968fbd0b9ca1dd5bb4258c9f6677e60650782f7dafa15aa58b8e380730493c8628b79d3d0a82b4560ccd58e7d544abef7005b4c59349a33fbcd86c3e34e814ad272ada8cf42f68ce92a2d1b327d73420aab8e18a0b9de33377ab7084e4f6f061717a3d7d9d192e0f36fa21aaa7eabf29c5848ee6a6d3ae0fe9a73049a0bcc9d7263c279d836014c42d1482f951909a37479520dd29b9fa753819450dc2a7fac1ff444fad0e51b90a3ab22b67a302f97a2bfc7f85d688ae2fd54bb64544b4924b49a915ccf7af8", 0xde, 0x3}], 0x1, &(0x7f0000000480)={[{@compress_force_algo={'compress-force', 0x3d, 'no'}}, {@rescan_uuid_tree='rescan_uuid_tree'}, {@thread_pool={'thread_pool', 0x3d, 0x7}}], [{@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_measure='dont_measure'}, {@pcr={'pcr', 0x3d, 0x13}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'commit'}}, {@subj_user={'subj_user', 0x3d, 'eth0security+em1'}}, {@pcr={'pcr', 0x3d, 0x22}}]}) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) 23:07:46 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000, 0x0, 0x40}, [{}]}, 0x78) 23:07:46 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x06\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) [ 492.618524] EXT4-fs (sda1): re-mounted. Opts: commit=0xf 23:07:46 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x8, 0x6, 0x4}, 0x2c) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000140)={{0xa, 0x7, 0x100, 0x9, 'syz0\x00', 0x1000}, 0x0, [0x2d, 0x8, 0xffffffffffffff57, 0x80000001, 0x7, 0x5, 0x1, 0x2, 0x8667, 0x0, 0x7, 0x7f46, 0x81, 0x6, 0x7, 0x1ff, 0x8, 0x0, 0x80000001, 0x8, 0x3, 0x80000001, 0x7, 0xfff, 0xffffffffffffffc0, 0x1ff, 0x8000, 0xfffffffffffffff8, 0x7, 0x6, 0x7, 0x100000000, 0xcc, 0x10000, 0xffff, 0x6, 0xfff, 0x100000000, 0x80000000, 0x100000000, 0x400, 0x8, 0x9, 0x0, 0xffffffffffffa3c7, 0x3, 0x7, 0x2, 0x7fffffff, 0x0, 0x0, 0x0, 0x9, 0x2, 0x6, 0x9, 0x4800, 0x20, 0x1, 0x7f, 0xc000000000, 0x1, 0x0, 0x7, 0x8, 0x5, 0x9, 0x0, 0x9, 0x1000, 0x9, 0x100, 0x6, 0xff, 0x6, 0x1ff, 0x7, 0x6, 0x5, 0xd74, 0x9, 0x2, 0x0, 0x5, 0x9, 0x0, 0xfff, 0x8000, 0x5, 0xf9b, 0xfffffffffffffffc, 0xb5, 0x0, 0x173e, 0x386e1cce, 0x9, 0x639e, 0x4, 0x7, 0x2, 0x1, 0x4, 0x9, 0x60000000, 0x5, 0xfffffffffffffc01, 0x9, 0x8, 0x8000, 0xe74, 0x8, 0x400, 0x2, 0x4, 0xfff, 0x7, 0x200, 0x6af58ad1, 0x7fff, 0xf9ff, 0x8001, 0x40, 0x9, 0x1, 0x6, 0x4, 0xffffffff, 0x8e4], {0x77359400}}) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x6) [ 492.824929] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000048,commit=0x0000000000000000, 23:07:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 23:07:46 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7800000000000000, 0x0, 0x40}, [{}]}, 0x78) 23:07:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x4c}}, {@commit={'commit'}}]}) 23:07:46 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\f\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:46 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000200)={{0x3, 0x9b5e, 0x6, 0x6}, 'syz1\x00', 0x3a}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140)={0x0, 0x1}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000001c0)={0x1f, 0x200, 0x7, 0x80, r1}, &(0x7f0000000040)=0x10) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:07:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000240)=0x1c) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000780)='/dev/null\x00', 0x202680, 0x0) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x5d) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000280)={0x0, 0xffffffff80000000, 0x69, 0x5, 0x100000001, 0x8000}, &(0x7f00000002c0)=0x14) vmsplice(r0, &(0x7f0000000740)=[{&(0x7f0000000600)}, {&(0x7f0000000640)="1c17801d5506e01f092f6083a57d02f2704e41df7d5e30def99e16fe9acecc1d3136402eb6c7a8370dbe31c2b0ee22967ec0c28dd80c7b0e3df174337006e293fb4eefae8108c51dae09448e72d2b6fee95ae4cfcd486713a2e95fe65c120bdb52a50357b83e323775b4525829e1b5bbc2c0d3180add5e9541e586ed7f6d5b853c4628409b5f3f650cb742b710ea43455b1b2eb77a660c2cb01f6bf492bb93454890175ff5aba9d7e29eb3e8693254b62a71260c83ce90b1af4f745234a757f53f84a639c36ed9c6c501", 0xca}], 0x2, 0x1) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000300)={r2, 0x80}, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB="08006d6d69743d3078666666666666020000000000000066392c00"]) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x1008010, &(0x7f00000001c0)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[], [{@obj_user={'obj_user'}}]}}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm_plock\x00', 0x4c0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) r5 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x2000, 0x0) bind$pptp(r5, &(0x7f0000000440)={0x18, 0x2, {0x3, @loopback}}, 0x1e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r5, 0x84, 0x1a, &(0x7f0000000380)={r2, 0x44, "626afffd77d9a2f6e486d7799a1b7a38f4e3987144962b94fa63ee90fe12e6cc1d93ed5cdbb39069f7dcbc17d9314790b65c6fdcd273d1f8a01f9addff0c7307474541fb"}, &(0x7f0000000400)=0x4c) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r3, 0x40045532, &(0x7f0000000600)=0x7) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000580)={0x0}, &(0x7f00000005c0)=0xc) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x76, 0x6, 0x2, 0x9, 0x0, 0x7, 0x80000, 0x1, 0x80000001, 0x3, 0xd, 0x401, 0x8, 0x400, 0x7, 0x5, 0x5, 0x9, 0xfffffffffffffff7, 0x0, 0xee08, 0xb875, 0xffffffffffffff80, 0x6, 0x1, 0x7, 0x5, 0x2, 0x6, 0x1ff, 0x83, 0x80000001, 0x5, 0x6, 0x7c1, 0x1, 0x0, 0xcd31, 0x2, @perf_bp={&(0x7f00000004c0), 0x9}, 0x2400, 0x6, 0x793, 0x8, 0x0, 0x9, 0x4}, r6, 0xd, r3, 0xa) 23:07:46 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x82, 0x0) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000000080)={0x10003, 0x0, &(0x7f0000ff9000/0x4000)=nil}) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='./file0\x00') ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000100)='syz0\x00') 23:07:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000300)='me\xa6\x1c\xc7\xe3\x97\xfa\xad>k\xa0aKory\x1aevX\x17ts\x00', 0x7a05, 0x1700) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000040)=0x3f) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, r1, 0x0, 0xc, &(0x7f0000000080)='$&!+#,eth0-\x00'}, 0x30) ptrace$setregs(0xd, r3, 0x9, &(0x7f00000001c0)="7568ce12657382ebba5ba07b29be5e27ef3fe44790784f27e3c5c60ba7474dd73cf91c59b69ac32b91f188ef0577005df78e8cd6bf0999610bcd06cb41bccf65ccbbd2d4656b242af1329d7f247922d846268b0d506936549b66e55984cec7b49592d921f3094bdcaae3c363260fc565a8f4625436cd68412b0583dd82e8fa18ae4b06172350fdcd320e8915b9e03944373b10e7955b86e1") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x28, 0xcf, &(0x7f0000000140)="66d7e150d29bc0f4bef51e24166f7a0723a379df6bd5d5b5ac20b07e4b4a8534e0d82abfbd074aba", &(0x7f0000000340)=""/207, 0x2}, 0x28) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000280)=0x100, 0x4) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 23:07:46 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x12\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:46 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x40}, [{}]}, 0x78) [ 493.397399] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000004c,commit=0x0000000000000000, [ 493.445771] EXT4-fs (sda1): Unrecognized mount option "" or missing value [ 493.484067] 9pnet: p9_fd_create_tcp (29068): problem connecting socket to 127.0.0.1 23:07:47 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x03\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:47 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) select(0x40, &(0x7f0000000080)={0x7e7c, 0x34, 0x3, 0x6, 0x4, 0x9e1, 0x4, 0x81}, &(0x7f0000000100)={0xffffffffffffffff, 0x9, 0x7, 0x10000, 0x0, 0x1, 0x101}, &(0x7f0000000140)={0x7, 0x5, 0x80000000, 0x1, 0x401, 0x0, 0x3, 0x45a}, &(0x7f00000001c0)={0x77359400}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) ioctl$sock_ifreq(r0, 0x8994, &(0x7f0000000040)={'nr0\x00', @ifru_map={0x8, 0x69bb, 0x8, 0x1, 0x3, 0x3ff}}) ioctl$LOOP_CLR_FD(r0, 0x4c01) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:47 executing program 0: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000240)='./file1\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0x7b, 0x3, 0x66, "953f2e18c4eaf06e233ba62ab8881e3a", "f1155fed1618663e88761684d7cc69beebe3c4accf145b4cabf85ab252147a4205548bac0d557493540e4a6736be3ba5731645d017513bb2d4f22d034ff462b94fb09a6e50cad08bd1e1101606c0653ff3465cb93010e216fa92a4d24abf8c9f71b53f3a147b"}, 0x7b, 0x2) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x201, 0x0) ioctl$PPPIOCSMRRU(r1, 0x4004743b, &(0x7f00000001c0)) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x9) r2 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f0000000200)={0x72, 0x1, 0xffffffffffffffff, 0x4, 0x7, 0x400}) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCGETA(r1, 0x5405, &(0x7f0000000180)) 23:07:47 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4ffffff00000000, 0x0, 0x40}, [{}]}, 0x78) 23:07:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x60}}, {@commit={'commit'}}]}) 23:07:47 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x06\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) [ 493.767117] 9pnet: p9_fd_create_tcp (29068): problem connecting socket to 127.0.0.1 23:07:47 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\f\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:47 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) 23:07:47 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000, 0x0, 0x40}, [{}]}, 0x78) 23:07:47 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x20) 23:07:47 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x12\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:47 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff01000000000000, 0x0, 0x40}, [{}]}, 0x78) 23:07:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@commit={'commit'}}]}) 23:07:48 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 23:07:48 executing program 0: syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x80000000, 0x200000) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:07:48 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00 \xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:48 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f000000000000, 0x0, 0x40}, [{}]}, 0x78) 23:07:48 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000100), &(0x7f0000000280)=0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x7f, 0x8000) ioctl$VIDIOC_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f00000001c0)={0x8b513347a626055, 0x0, [], @raw_data=[0x2, 0x9, 0x7f, 0x3, 0x7a5, 0x0, 0xb5, 0xfffffffffffffffd, 0x0, 0x4, 0xfffffffffffff000, 0xf43, 0x10001, 0x2071915e, 0x1a7, 0x0, 0xfffffffffffffffe, 0x1, 0xa0f, 0x1d06, 0xfffffffffffeffff, 0x80000001, 0x8, 0x5, 0xd5eb, 0x8001, 0x2, 0x6, 0x6, 0x1, 0x6, 0x3]}) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x401, 0xd2, 0x0, 0x100020, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000000279f2266392c000400000000000000000000000000"]) 23:07:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6c}}, {@commit={'commit'}}]}) 23:07:48 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\" \xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:48 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000, 0x0, 0x40}, [{}]}, 0x78) 23:07:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1a6, 0x0, 0x100020, &(0x7f0000000280)=ANY=[@ANYBLOB="636f6d6d69743d30786666666666666666666666666666661a1ad1cb0ca0d5392c005d21def348d4951fb00fd9e7f0a5020875070bb52ce9b53a4b52689d33231ba5b15d477c708006affa876b77f29c89abd5df98d0d91776"]) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x509200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x113, 0x3}}, 0x20) r2 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x1, 0x800) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000240)={0x12, 0x10, 0xfa00, {&(0x7f0000000140), r1, r2}}, 0x18) 23:07:48 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='./file0/file0\x00') r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x200200200, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000040)=0x7) 23:07:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x74}}, {@commit={'commit'}}]}) 23:07:48 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00 \"\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:49 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x2000, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000080)={@initdev, @initdev}, &(0x7f0000000140)=0xc) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000000)={0x0, @speck128, 0x1, "db11aeaabece9b9c"}) 23:07:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = accept4$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000140), &(0x7f0000000040)=0x60, 0x800) fadvise64(r0, 0x0, 0x1, 0x2) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) 23:07:49 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x40}, [{}]}, 0x78) 23:07:49 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00?\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:49 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 23:07:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7a}}, {@commit={'commit'}}]}) 23:07:49 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x0f\xff\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:49 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') 23:07:49 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x40}, [{}]}, 0x78) [ 496.097977] EXT4-fs: 10 callbacks suppressed [ 496.097991] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000007a,commit=0x0000000000000000, 23:07:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xc0}}, {@commit={'commit'}}]}) 23:07:49 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x02\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:49 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x24) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000140)={0x401, 0x204, 0x8, 0x5, r1}, &(0x7f0000000280)=0xffffffae) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') accept$netrom(r0, &(0x7f00000001c0)={{}, [@rose, @default, @remote, @bcast, @default, @rose, @default, @null]}, &(0x7f0000000240)=0x48) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000180), &(0x7f00000002c0)=0x4) 23:07:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) getresgid(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)) 23:07:49 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x40}, [{}]}, 0x78) 23:07:49 executing program 0: acct(&(0x7f00000006c0)='./file0\x00') symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x9, &(0x7f0000000580)=[{&(0x7f0000000140)="d0fb50119955d15c11fd50e5dce634df0f046dd1e40fc8e4893e3dbd4ea9ec2a9865f6d48d0407a6712019e0ee20402181c6f4754786d39677c4cd55c5a4932a34bd4ec7e61cef361c1c3f97abfcd5c1c472e35011f98de8b586f95a543800efe559a97a8c87655b430c9b61b35772e9866fd8155f9b75451d51aeb1757dda27a39d813e996d974b6512a02e44a88dd1dd0aa9c2ee1f0d25e614bf96f560050fedd50d7746320e4aab67ef1a3c6deb6550203060a40fa0df708b80fa4bab7a9a4d11484a56957d2f79b0ba6669cf", 0xce, 0x1f}, {&(0x7f0000000240)="b4b67c11f78317411ab0bb8aec0d346005feb4588c8c06fad95b41d5e0cb3e36e7ebc3178e7704f7685b078abb220ae776113a87dd8d2b19131813e0b5b8dc6cd80c688e045816b857e098003580fcc0ae879377a7152b96b27937514dc4dcb2b24649d0bb9d0cd10d0546eca872784717fafbb5e75f7e24d5641af904f501ba36c2df065c4c60e8adca3490f1ff6d3657b8db387152741e284d77dd5e795db7ca424e", 0xa3, 0x7fff}, {&(0x7f0000000080)="766da15d0332c1efb87aa9bc61d6d9b0e3d8b8d55438835feb", 0x19}, {&(0x7f0000000300)="35dfe9d3e9fb78f823227217e0219c7fcc46e1cf599ef5255427351be0fb7b39ddaa54edc3755d150c654f1371f1d32397a78f949eba48074cdbd46e23de0051dc", 0x41, 0xb38}, {&(0x7f0000000380)="b96b2fcd4e6ae6de9cc29f8e44b9227dc3c5fb727eadc26e094d50a03faab7d69e33bf785ad045eec9487fdd3406b369f530c601a66698", 0x37, 0x3}, {&(0x7f00000003c0)="3690b0794f27d3ead6f85b0251d4e4692572913c57a875864c971a3bd572a33730caade97fb4f1bd57670be7dc4404dfb7794df5d0b52c9359c75ecb3313c5e342813ff8b137067500c851c096f698861b3e9fb78e434c6b62810429eb5c2e57836532cc33821d60fd4037d5c7ff16b55d0dd4f1", 0x74, 0x101}, {&(0x7f0000000440)="771b0be89f29f5903274532f6cd18970f5d24d5c2261fd3aca160c53ac3c12663957d8ac991fa150d39099781f9a0b14240e8b894077b60e7212bc043edafab15b774cf569a64b2e87c240fc478a9ae14f1fbb03ed46a6403d44959df529482a8fa980260de314e52cd222bd634e7ad9", 0x70, 0x40}, {&(0x7f00000004c0)="c2b165c31d43f8", 0x7, 0x20}, {&(0x7f0000000500)="fb50f33cbc0872b4a0b48c78aa6134da13e11e36fd5ab7aa61716f1f4ced7e2c8841c5827f05ffec001a3c273309f1097013c73fdd1c216421920ad08d6608b16be46fc69f6a33c2171ef9fbd92091b16c8671c176d8530d9dae", 0x5a, 0x9}], 0x29, &(0x7f0000000680)={[{@numtail='nonumtail=0'}, {@numtail='nonumtail=0'}, {@utf8no='utf8=0'}], [{@measure='measure'}, {@obj_role={'obj_role', 0x3d, 'securitybdev}'}}]}) [ 496.348158] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x00000000000000c0,commit=0x0000000000000000, 23:07:49 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x03\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) [ 496.505807] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x00000000000000c0,commit=0x0000000000000000, 23:07:50 executing program 2: prctl$PR_SET_UNALIGN(0x6, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:50 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x40}, [{}]}, 0x78) 23:07:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}, {@commit={'commit'}}]}) 23:07:50 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x04\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:50 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:07:50 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) write$binfmt_script(r0, &(0x7f00000001c0)={'#! ', './file0', [{0x20, 'commit'}, {0x20, 'commit'}, {}, {0x20, 'commit'}, {0x20, 'wlan0*)ppp0md5sumem1bdevposix_acl_access'}, {0x20, 'commit'}, {0x20, 'self'}], 0xa, "3c60ded8d3c95b14bf7b5cf31e3b5d98533ac40096f292c11bc3b641a78260bd1f867b478b34dcaf8174aa71321332333c7beeed24f3235d31f88f90d2e9c5cf17f58fbd4f0a489dc2657b2349e4a96b03f377c8abcf82d00ed425ac8bb8b1765f"}, 0xb7) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x4000000400, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000280)=ANY=[@ANYBLOB="636f54849ff06462a5a56666666666666666666666666666392c0015d9f9f5e5ea20469f9eaf16dc1a22dfc8daef4519a655d0420711c33d8790594ed70a41772442781dca1e1f3d81342c25180dcca9070087c929248783cf70eb6da19a72ac855137938b1f14df44cb7841efffa78cd0d8d5fd8bce6d43324e9e2d4776039733dfed9656fac2a94151d30ceeeeb802f0a504323ae7d91ddbd55ab030b8cbeda699bcdc4e7bb32dfb1172317132be4ab73f001370a1f1d0be5c53639522e66d"]) 23:07:50 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x06\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:50 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:07:50 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x40}, [{}]}, 0x78) [ 497.018744] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000300,commit=0x0000000000000000, [ 497.161137] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000300,commit=0x0000000000000000, 23:07:50 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\f\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:50 executing program 0: ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000002400)=""/4096) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) readlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/119, 0x77) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001240)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001380)={&(0x7f0000000200)=ANY=[@ANYBLOB="02fd243c12265a80fd000035", @ANYRES16=r1, @ANYBLOB="200026bd40689fce1b4bed64000024000300080008000300000008000500ffffffff0800080008000000080004003304000008000400ffffffff0800040001000000280001000800010002000000080002003c00000008000200020000000c000700080000000200000008000500010000000c00030008000100010000000800040008000000"], 0x8c}, 0x1, 0x0, 0x0, 0x80}, 0x48044) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0/file0\x00', r0}, 0x10) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@assoc_value={0x0, 0x5}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340)={r2, 0x1f}, &(0x7f0000000380)=0x8) mount(&(0x7f0000001140)=@loop={'/dev/loop', 0x0}, &(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)='ocfs2\x00', 0x10000, &(0x7f0000001200)='/dev/radio#\x00') 23:07:50 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40}, [{}]}, 0x78) 23:07:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000040)={0x5, 0x4, 0x100000001, 0x4, 0x5}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 23:07:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x500}}, {@commit={'commit'}}]}) 23:07:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB="636f6d6d69743d3078666666666666666666666666ff0100002c00"]) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x8202) setxattr$security_smack_entry(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='security.SMACK64IPOUT\x00', &(0x7f0000000240)='\x00', 0x1, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000140)={0x0, @multicast1, @multicast2}, &(0x7f0000000180)=0xc) 23:07:51 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x12\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:51 executing program 0: lsetxattr$security_ima(&(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=ANY=[], 0x0, 0x3) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0/file0\x00', 0xe, 0x3) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:07:51 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40}, [{}]}, 0x78) 23:07:51 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x10\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:51 executing program 0: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000002500)={&(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000000100)=""/152, 0x98}, {&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/4096, 0x1000}, {&(0x7f00000021c0)=""/171, 0xab}, {&(0x7f0000002280)=""/85, 0x55}, {&(0x7f0000002300)=""/185, 0xb9}], 0x6, &(0x7f0000002440)=""/159, 0x9f}, 0x2020) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000002540)=@assoc_value={0x0, 0x6}, &(0x7f0000002580)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000025c0)={r1, 0x80}, &(0x7f0000002600)=0x8) 23:07:51 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x40}, [{}]}, 0x78) [ 498.109580] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000500,commit=0x0000000000000000, [ 498.143038] EXT4-fs (sda1): Unrecognized mount option "commit=0xffffffffffff˙" or missing value 23:07:51 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\x02\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:51 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x40}, [{}]}, 0x78) 23:07:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x600}}, {@commit={'commit'}}]}) [ 498.317861] EXT4-fs (sda1): Unrecognized mount option "commit=0xffffffffffff˙" or missing value [ 498.456846] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000600,commit=0x0000000000000000, [ 498.524245] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000600,commit=0x0000000000000000, 23:07:52 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x900, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x10081, 0x0) r2 = msgget(0x3, 0x2) msgsnd(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="03000000000000005cc447a08eb981f4e74a1fb22401000542a1ed71e466f9d488347395df43c9b341bbee3c8174821eca2dfb51e43fe5ec9deb9c695cf344609e1281366d04396b9c734fa8fecf6d5bd6586a54780a69917108856adfd93248cae82f1d957fb1c6cd96b663dca3a310cb0a21193443f6170289a841dc233bd954a4d9000000"], 0x86, 0x800) openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_user\x00y\xff\tG7\xd1\x96\x9b[\x7fMF\x1b\\\x1bp\x819\x8a\xde\xa1\xbc\xd1\xe16\xc2\xb6z\xa9-\x00\xc4\x92\xcd\a\xdd\xf5\xfc\xc8!\x84.\xed-\xb0\xe43751\x91\xffY\x1c\xd5F\x12\xae\x901\r\\9\x0f.\x1e\x97\x05\xc2\x9e\xefD\v', 0x26e1, 0x0) r3 = openat$cgroup_ro(r0, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) ioctl$SCSI_IOCTL_GET_IDLUN(r3, 0x5382, &(0x7f00000000c0)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$cgroup_pid(r3, &(0x7f0000000000), 0xfffffea6) 23:07:52 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\fm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:52 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') timer_create(0x7, &(0x7f0000000000)={0x0, 0xe, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-vsock\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(r0, 0x1, &(0x7f0000000140)={{r1, r2+10000000}, {0x77359400}}, &(0x7f0000000180)) 23:07:52 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x40}, [{}]}, 0x78) 23:07:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000001280)=ANY=[@ANYBLOB="636f6d6d694e2c30bca671c001fe010000000000000066"]) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000001180)=[{&(0x7f0000000180)="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", 0x1000}], 0x400, &(0x7f00000011c0)={[{@noquota='noquota'}, {@noquota='noquota'}, {@balloc_noborder='block-allocator=noborder'}, {@hash_tea='hash=tea'}, {@errors_ro_remount='errors=ro-remount'}, {@nolargeio='nolargeio'}, {@hash_rupasov='hash=rupasov'}, {@commit={'commit', 0x3d, 0x4}}], [{@measure='measure'}, {@smackfshat={'smackfshat', 0x3d, 'cgroup/'}}]}) 23:07:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x700}}, {@commit={'commit'}}]}) 23:07:52 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\x0fm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:52 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, 0x40}, [{}]}, 0x78) 23:07:52 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpgrp(0xffffffffffffffff) write$cgroup_pid(r0, &(0x7f0000000140)=r2, 0xb2d3b89463c9dc86) 23:07:52 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') timer_create(0x0, 0x0, &(0x7f0000001240)) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x77359400}, {0x0, r0+30000000}}, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000200)=[@in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e22, @rand_addr=0x8}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x20}}, @in={0x2, 0x4e21, @local}, @in6={0xa, 0x4e24, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1b}}, 0x4b}, @in6={0xa, 0x4e23, 0x0, @remote, 0x9c}, @in6={0xa, 0x4e24, 0x400, @local}, @in={0x2, 0x4e20, @loopback}], 0xb4) timer_gettime(0x0, &(0x7f00000011c0)) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/vsock\x00', 0x200000, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f0000001500), 0x1) 23:07:52 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\x10m\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:52 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88, 0x40}, [{}]}, 0x78) 23:07:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='commit=0xfffffffffffffff?V\x00']) 23:07:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x900}}, {@commit={'commit'}}]}) 23:07:53 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\x02\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:53 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000040)=0x471d1b72, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x6}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000140)={r2, 0x4, 0x9}, 0x152) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 23:07:53 executing program 0: sched_yield() syz_mount_image$nfs(&(0x7f0000000080)='nfs\x00', &(0x7f0000000140)='./file0\x00', 0x769, 0x8, &(0x7f0000001600)=[{&(0x7f0000000180)="6faabef12e4ca9b59571435e6405aaaa", 0x10, 0x8}, {&(0x7f00000001c0)="10dfc68270ff4a3fb90b3fa826dfbe2736e3da26bfcf5d4f423be9de57af8c4bcd89b17f3443cdf4b3d59da1cc08b0bc63f9a1014ca8f811a90812e780f5743f9c582f3b56592ced2a64cc98e67f134981a22d1a15f6f632900d58a7b039f4ce4bac462b45ef799748a3f260236a619129c487e6435644d8994c577b6186d16cb5e07a13893809c8c83a97449875b08882b32f889cb1aa33372638eef1bd0b30ef6e06", 0xa3, 0x29}, {&(0x7f0000000280)="c23a588f12832f4cc0a293404636ed40acbcb7e3419af3dba1c38b0463b3b92cbfc858b394899aa46924434fd9b8ec2c8aadfd23da962cd5554881f29623685c99c5c1a043b4206d854060452d04cb353345812403118d14cff50881135dbfe9b981fa2c7eaca6b3932315e9bb190cc7a753b2055f823c5e7993541c9a2546d12807ec196b2873e8e9e176ad7852e5af293c8cde645f19935b0c877a526c77c196629423b0c815c9ba91879e11a4a9cd3bf68e1260ba52011ec3be4cf59fff781cf3d423b3", 0xc5, 0x80}, {&(0x7f0000000380)="06252da21b3a7ba8741d2819186570188cfbd1ef4c58754d8fb94c63306948e598fdc83b7a450b694ce53ce5a6079884613ef69cf0455d38c40d7bc8cf0f9bc43af3de89efeaf861198747f09aa0ced4ad0f4b7778546016aa", 0x59, 0x1}, {&(0x7f0000000400)="211d922f9ba9e312e6a4836e64b76d05e4502b119a10e3257163abffc41aa474023582bc62fb2863169a997590d9023e41bed2e68bbfff3af17c9d86c023d2d8ad0a5aedb02aa906cccc962a08f11f9290f7f9717eb07a2ef3d1f5f2c15ad8148ab619a5911d680d0d6f8f87f1861d2310d6de76e64274d5a277f760b731e04d6a7e797d05a502764b85c904d041aa514ccfadfa1ec5f53ae112d07c130187df7d5727a93fa1ad64edde184878548fa8fbd32ddd5f7f341caac1c6212ac16d82000cf1462ee9b0a489e51279515acd147e7f7ddc84fce7398462dc32183714f02b1277eb6a3cf2a4640afdf55f18b38e255d5d401b18af7f485cdd8bc933ed264f0f961de42d35db2a344519b3bec23eabb99343b71d5c129b83552da29bdda6f4d50e3642897eea2bc617a824b2c2ff3ac56fda4b757f57afd63d2db5d60fef7fee7a8acacd59f3159240288a24d68c046dd2b3a145b344aa36f0da79e2aa0cbe1ba5f6945846a704491a77e4577d4071237bda46d4d2887b92b0efcc1e8be959441c5f9be95302ea716c00e1cb8f9f37240074a98452a929dea8dfee8c5ab618f42260ff7e4832995aa62598ad26ceb0a55e14c3aac9204dd6c08ff5f1a674582410babcc3de4daf05ce4d9b7d2ee544966e8569deb2c56e43769a1863fe77e2b9760cefe4b63a3aa2269a7e0ed6146947064c0e1eaa9c7ade8f9eb06b72bab352ff797b96c1249d7176f5f1394c7a2220fee2765a7ac49476977583fba35b3c74f40e88c386a9f7d768fc353a203ee4ea71ff7ba0c243f8a78ee7b8bf76fcf3194e5ec544d798dff7c7d7ce83aabdffca66f3de2be304ff267d36b0328bf7aa979c6e5c845899e82ea45591e7e78e5de92c3f06787db80aaf48de9189cc8076f3e0ded56e37e923150840c8cf5ccca72b2ba81f9a24447e87f82c23b4a33da99112b19e538a1e75bf08b0d00e1eebae1265a0107aac3b038f4d687f70c2b084c94bef322bb8d790dc5eb1151314b74b369bf6fc319881c4a765867f7bca9964be13742a6b54fd4b384847dbc2b44b4690b395d1e51f984d0b1f3a9b06ed536b90f045edbb82977b922607f340146d8de1305ff8afb26be56392a1b65fbc4d8713672dcc26ff04a9a6f0e9cf501021dbb951790a70fc0b0cd30a8133492b4b515cd6dc3b6d44264ef59deeff6b4e9b595059697774c31ff5bc83900bbbaafacd95e84a2014060d39443f30f4737036b13ddb548cb996f31c3e5c47f16e8ddc636b206fc98563a97f21586c9053890645e5ce2c5354c6e7c06042bd17d8bedbba22b5f576798d39d7beb08350fa40a8aa7c45b3f752973554669982937a1adc065309faf95721b0841e0632bffdb133d400a391c405b3336a40cc2ad0a0fc6efb689536e0503383f230a746510e1b01bd6532bdf97c157ddcf41736d33679cd3f69f0b2131a17b9f3f431b7e7c1d49df9caa5b3efb7dcd06e3b221cf899b46c929d9bec22d7fc6270b3b12d1ee44501e3f598d00c7eec6d472041084ccec7f3db52c6405ec1ab37ad326e888f095d949357a9e4fae50abe04dd944d59712501ed59cad5ff399861916bb174ca5836cc1bcc785ea49bd89a84d1bac22c98ceacaba64c631813628dcb853a918111ad72c7d56a9c0f8bc95b500e08102c074f7c1f934494702aeca5de87371141c296bea621159421597e8d5f54f561b5dcf2eb3f47eba1374fec8063f9bc2b697b0878c633920f7377102c5fcdfc97bb8c7d2727b4de7800fbeed648728195fa2c6da4992611b5d10495b20beb5dcbfbf44bc492d016d010839a8a3de4a5e745f22127dfa50a012dc0561b48405cb127a972586645b9d7dfa88f6cadcced372f0d5000a32d94971ebb58c109d63a30a9e87da9bff76ac33c607c38a68f671dcb01190e838ee797257d59f943cd6c098e7c5dc925849c96a07d7d85512be4878d6edeb3e21db8c384b2a47ec4230c68d486a5bde082f94585a39f824174ba8a133cbaa966fc1f56d4141e6f61d5076edaac5dfecf9db2a60953b21751edfc087c7ba2a9cd79fdbb08334ae161611743ccebbc63548f6b36a82767b7d29f84ead42513a3291a9b775bce4309bec040ad99f7576ce4e7a25c95d620904eb83a8deb4493c30cf5e032cdc6e3ae378b2f986eb90827c74f1c872e5f3d6c71bb6eaec63c9cf641d8830e23a7b9eff1d767386260ce287be8a003594e71da394e721caed9dd47580ad67ddc92dcf9ad79f7bed82c7c4c69386474e8513e4bf2b11d8b3fc4ea3b0ff1b4633f51de582cbdc63b5345ce59787441fbb23c364ced748454cb631a5793ca378c4e7d4eecc17347dd2142da71517e0adb9a8114153276512a4c198888b3785305c37211e7a2837d0758da3095fb2c3d7d17804ccca1cf5e96783840f0557881ac8c1312b7f5e53b5679a27c9002974ffdf4a194db4c13d6e19b02b8d82fcdee0fd280c2eb888c62b182a3d2be4a757eb38abe5b0e8ff951c1bf476a1e424f83b1e75f31719e56c867943bc0b3575189515db96cc2356f9c705a0477af48dde43de1aced9dc0661c238ab927dc3d2c79bb5e0f281de8ad02d1b36bd8955b0ef8137b6a7bd1a836e62da92c0004fc3783d779cb69256b2e0ff1eb45d015737aee36787d044936507d187f8b897d0b26c2c4e7dadc1c3cd1a50b2d756caeff82766ebb08587f8d4a25acfe3ebb819c4ca21634ddeafbb8aeaa76eb72437d9ee5162897f2431deb6ca6fa13cac3477f1d3c8f663faab7770aa0490872e9b324e3c463fa71798f990ed9ec13d6016574f20f222a0a9963e2da6cc8c458555faebb5bd3af991f59ff597baa6841c0985b291274b372030360421675ee3d4c38bb69cb53c8a82dbde496672c6e1c4639bbf4f58c059a77825e9b5e44e237e48e2d540d9285a79bcd234db2695c1768cc3fb4138c654864bf3d4550f1499e5d50f6d8a3d489a119e6dd295b9cc80bd7bc7cfd6a8ee99bfac989e2c4d2723cef0dfadc69509d5d79a0b09bc77daaf36d97658f021c96b6e97505a4fe43541c81ca558f34e56ca0cacdf3a40a076bfc9de8979f86cfbd2de391ceff66d485db85148b73ca7fa910d69775b06d83a367beacb6035afe7ad63d35cf08f7e6befd05d23834817ce14597d7743d46f48ed7cc612866de76a031be67041d62a44f2e2d9530ac7e5d9f78f65ad72ab88d0b9fcaa7deb897f555c3af51cf5084c8c4f0ca7311ae2fd6e6c459a586dd496f501ed34864f8e6e3d31574ce8c422ddf64af0d9cb13da182a017516c689af2d8e75fc7e7257c5102331a83e8e1fa2f4e6c14f098992dc3e60d2734ec4c9ff6d3941b5da7c6758c2d92e5b0a8df2feb1ae332291a0b00ae51ee1b0c991f524a580d33ef465f842ec609091faf104d0b218222a3b57549cde3c98354aadb22c889fc7bf8bef7ce4a92f594beb37bf675bd724492f8f690b2013a38fe8bc7b42d0f0086e0814b0e4a444a133542c684a158c8737d3127a439d37b7e2073854c217771487a11f8fbf86856bd61d4a81949736afb86cbe49ed49a7ef8b14bb229c961e20bafc9e2d2c3b33b8a73af0982a0a3ff4e1d688cf4e12ee898e19abe764a979288384a904d3e9616917bd0b0272752e239d1f72c285ce1554da50ddd662f40b56615828ec060cb8c397b3346d463b7313cbe75a28150009b537382415da598902cac4bc1aca17758102b942f6315e510e153181092c855d6c0a2953e475b5937296ce50f018cb3eb659d6b347e972c90f2c11c9a6c16b36ea5d743fdc2b76839eaeee36a89d5322c2d4392ef2c14122759ccef979ba3d4340e7b9bdcd6923ec84a010ff6601f9b9d3401876e8c879f4cf094da5eb55ee8a1c4b4e6dd8d024c4c350be2c12ac1cf8a64f42518848f7593f312cfa02de16509218a5579b221b57008e31e6b6b6d91c761897f4a19fe4f3d68203a3dac516dc41121e85f7605440bbefbd46ce7f25c0426ceb0a3b55d0995985a717e11c91fdbae68f00ef61cb529ae9bf95d0a9efc1314b5a92b400a7f6ee3fb452f0d1e00438394525dfe626e57fbe39c2e3a76a5c44aa543d2c62569895a9fbdfaf182883bb2b6b27279d26603e32ab811f7769c6a4a8e2fd76c27c00945c51d22b0842dcb3dd2050527577e8b57d9e799ec6e4acdf18db93d2c11237c298288102e6fe35a60198f31e6ffa82d8500926524c936b9e5b75acac8f17571f2640d0fa4b20db7aacd21d9b8e494d33b36f35e8c7b68f1c073c434e9af846eefeb802c8f0d8a53df0ed048e10d8cf18cb20a9eebbfd6f9c7d4064bee7093fa0201d9ae1e6da8cac5ed51337728fed51dea6c4887f19b80fa53e86d01cecdb789f02378a6bb6ddb259a53fcc52cce510fa9536c777a20dd3d83110a586a86b0af7a7f9732a51df4c45f67d3f5a1ed8b1dadde17f2c0598ab7329dd4fea262bc7464709010685e3ea6e563ba1d5db8f1c1a5300b38879819b78266d999cbb5a0d5db56e06ed9cbe90f586b9507acdd261ec754de837c1167467118da69de89bb4acd7c68e9ed0a9d4173cf16e2c4a15028744434b2a5c7f385f449f247cb1089819e11242e799ff65c7af5a22621289fddd7740e9c589e725415029f70e574869458d15f753fe90dc9037087eb51e86f5dd3550a02c239b89671fefc5cf335e6be7c4aa542c0f4e57463b1dcdd2c39defb11f739cdba0adccb4d5cddba1775ef6af74821a76f925f35e031756f4e1a02c36cb14d3a7645d1cf4ab2d78c3ac0c264df4a804ddc84416892fcc42b0eda8e93cde6ea05c36c7f7e43aa80d144de56ac58ea8b6860846aaca09213d942ae20b848d158836d6d840c5689181727f3504c322342d458624782a8915df64ef4633bce38617f6aeddf9eb884aca0871bc02263f761fc83c094fb99cf173cd735859ee7fbb6df8fb154428446953b4b4dfcf0e66e35b73ae079aa3767c2c5adcef4b439b0099bcae4ea858c5261c9e62b6e65fafa2493c924db445a1b29f7ef70cc607cf2becdbf0ddb9b82409d990fcd11f1e6e38379e51c99d225a3e4fc0421bae651e16e6e787ada9ccf2e79cd539d2b4308219bebdb71b4aaec2715c24feab1255d56d59d0f6152d3f9151a24f4bd0aed4498405bc4c924e09f9394e5192c4d746e7e364024d64b156edeeb34bf08dd8f6c7c0457ad8e326dcf7722a9d01afc4018a1727c04e17fbe940d94e2a7fa3710dbc17713f048921e60534e45e67803fa9f9f9bbdf435a0ca93b3eac77cffa4debb666a069d5eb13f068c794d8e12396e007bea22550d77c7996eceba9e94aaea0f780c1f3ecd583aa53e64f3f33d0fa121f1a7bd505498fc1011018d7a4da3cf0a1a1ee266b3f343f1225a0ea70c4936b9d87da1a4316b4c5d35840881aabb99dce5dcabd75d4e4e6b9823613a5ff685361a962841d9a28e1b18eab00d8ea259f8760fe80d6fd6559272549bf6f37a03b717bdf48a4ec6caad8c98fa37d67f0af7bccb15871d2b564481006b0c631add434e9a02947d5f96de9cef871bffeac9be14c0f735094aafc64abb186d9d03ee86a64abe628a5980c9ad32391ebf84f3883a48e20e641660f0097ce2fda9bea3c229fbed59c218ddd138e08905a8dde24420ec7741369e32c657def8a10b9272c4a56c2e721cdcf5e9865dbd2ce4be92588ce44aa6c0b9185aad471068bf4cf2bc68fb798cc3daafc3be558be6448942c563c6002097d6408e6d074f82de8972086b9988cf4652acc79dc2e12a682fad2d1bd50061392d041b75725c3e0649a29592", 0x1000, 0x700000000}, {&(0x7f0000001400)="6faf3750ddf46cd2d009bb83daf6ddde987f0143db090111daccf8f563a8f43b3bc6645875fddbaa8719659320e6d784876b0436fbfcb58a8b2262b9ad97e11a0f391d5500c1c6c77f1f2e4f8439c398f4a8d6e63bab2d8239710fa61ade3f180fb599e10b102292252f173546a7de708223cfe5e24a5ed85844613710750a2e709f0897023b0384c0b67ea2b771651df9b5521d4c617b61114d8d4b0c11b18c9e007e9bffefc8fd1abca589ac6d0b2f2ed82824d733cb08e82c267f4d25ee8fef0b9fcf28b4337bebc11fe23a0312033b04e93e", 0xd4, 0x9}, {&(0x7f0000001500)="6169f37835844f27bc44d9737236e78185583840ea51f364d63028173d2b0dd900c672e92f11f0e8f1581aa1b10239b5674611f9f3c8acbfd871cf9c292224a2b794ebf76b59e623d14df527e3778dbf3be6850203e3480f9a124e7a7d4eb884b2f0566bdf0531279d12e0d86062e970b12446ba43556f30a38b1b57ef0959c1bd6a9d2473a6834a2fdeb1bb1590a94864388c33da0e02309c9822cd171c73f5e2e2d23fd9a858a3d9dc9f16735f756fb87b9175763bd4bae5da50d605183d16", 0xc0, 0x100}, {&(0x7f00000015c0)="db602172961a983c1257ccc9fa3c036d22a539875fa51625535a9f45", 0x1c, 0x4}], 0x1800008, &(0x7f00000016c0)='\x00') r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x3f, 0x8000}, &(0x7f0000001ac0)=0x14) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000001b80)=ANY=[@ANYRES32=r1, @ANYBLOB="6f0000001c4f5dac85b05829baa7a1185625478d9b4d44ed55960fdfdcc809e35be3a6c0b21b526fdc7f931d0f7d45385fb7770cead3f1787a8513719430cc7f94d571d85350926e1a90dd515c012e2dfeabdf25ef3de004da4d7171552ae1894ae7615e"], &(0x7f0000001b40)=0x37) r2 = socket$inet(0x2, 0x5, 0x8) getsockopt$ARPT_SO_GET_INFO(r2, 0x0, 0x60, &(0x7f0000001d40)={'filter\x00'}, &(0x7f0000001dc0)=0x44) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000001c00)={r1, 0x6b, "14174a02a90638a06490e13d01dc5da84e673d08a289c34a5fe3fef551d30a1b64d7bf37779614f4b4704c2bc696344439a4436e99d79221a8e6df6b4f89b888acfab896d9b806fdd3e4d557a77d73f6d0554018e2d6b26531dd35210f4c9c7b7187abb3d4a31678141c5f"}, &(0x7f0000001b00)=0x73) execve(&(0x7f0000001700)='./file0\x00', &(0x7f00000017c0)=[&(0x7f0000001740)='(system\x00', &(0x7f0000001c80)='$-\x00'], &(0x7f0000001a00)=[&(0x7f0000001800)='\x00', &(0x7f0000001840)='$-\x00', &(0x7f0000001880)='nfs\x00', &(0x7f00000018c0)='nfs\x00', &(0x7f0000001900)='\x00', &(0x7f0000001940)='@', &(0x7f0000001980)='\x00', &(0x7f00000019c0)='nfs\x00']) getpid() r3 = getpgrp(0xffffffffffffffff) ptrace$setsig(0x4203, r3, 0x5, &(0x7f0000001cc0)={0xc, 0x1f, 0xb67}) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x803, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000040)=0x10, 0x4) r5 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') poll(&(0x7f0000001a40)=[{r2, 0x80}, {r2, 0x21}, {r4, 0x200e}, {r2, 0x600}, {r4}, {r2, 0x100}, {r4, 0x4020}], 0x7, 0x101) ioctl$CAPI_GET_MANUFACTURER(r4, 0xc0044306, &(0x7f0000001780)=0x3) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000001e00)={0x0, 0x5, 0x0, 0x1}) 23:07:53 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\x03\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:53 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x408, 0x40}, [{}]}, 0x78) 23:07:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}, {@commit={'commit'}}]}) 23:07:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) r1 = open(&(0x7f0000000040)='./file0\x00', 0x80000, 0x8) utimensat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={{}, {0x0, 0x7530}}, 0x100) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0x9, 0x1}) sendmsg$unix(r1, &(0x7f00000005c0)={&(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000340)="6ac018b3fc8a1d381a989b1dd70620cfd0698c0008b9a543a23eb1d3c7c5a3e4949b73cf5ffa8c2767c29d3ee615be13c12b9bbd64907f60a313a76d56011ef62284fcf253012188ce5b7940ab05720888c9976c8cb77c08a11b39da75b99ac936f816879071fa1cd88eeae9dddd16d1885a2c79d0bf330a9eeb728f15e0e0cbd5f45d5722d246c8f6c1095c249a9a3552e63d43", 0x94}, {&(0x7f0000000400)="a1cabf92ee19db169a105a6f4eb247f067475655a51a09853ef2ef269a27f1146a93c9480797419e1c8970731c67f774b4988b7fb3b038efaa8ce67291fb318956516cc18bca87c9b96d455659bef953832aa0023be530cfa45e1e49f6d239a50631afd3dddd38f252b283be6ffb79971d87065372c00eb1a81743ed49ad88ce665b5a97f17262b44aade3018660b6132f30226b48f437c1c15654e17bfa", 0x9e}], 0x2, &(0x7f0000000500)=[@rights={0x20, 0x1, 0x1, [r0, r1, r1]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r1, r1, r0]}, @rights={0x38, 0x1, 0x1, [r1, r1, r1, r1, r1, r1, r0, r1, r1, r1]}], 0x98, 0x80}, 0x24000800) setxattr$security_smack_entry(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.SMACK64MMAP\x00', &(0x7f0000000240)='commit', 0x6, 0x3) 23:07:53 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\x04\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) [ 499.847905] cgroup: fork rejected by pids controller in /syz0 23:07:53 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x40}, [{}]}, 0x78) 23:07:53 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\x05\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:53 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x40}, [{}]}, 0x78) 23:07:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000140)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XT\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZ') symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:07:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0xa040, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={0x0, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xe}}, {0x2, 0x4e21, @empty}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000140)='ifb0\x00', 0x92a, 0x9, 0x1}) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) timerfd_create(0x2, 0x800) io_setup(0x2, &(0x7f0000000200)=0x0) io_pgetevents(r1, 0x80, 0x7, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000340)={0x77359400}, 0x0) 23:07:54 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) r4 = getpgid(r3) fcntl$getownex(r2, 0x10, &(0x7f0000000040)={0x0, 0x0}) openat$cgroup(r1, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) setpgid(r4, r5) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x81001128}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r6, 0x301, 0x70bd2a, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x4000005) write$cgroup_pid(r1, &(0x7f0000000000), 0x93a9af0e) 23:07:54 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\a\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xf18}}, {@commit={'commit'}}]}) 23:07:54 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x40}, [{}]}, 0x78) 23:07:54 executing program 0: lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.upper\x00') symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:07:54 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x400, 0x0) ioctl$VHOST_SET_VRING_CALL(r1, 0x4008af21, &(0x7f0000000200)={0x0, 0xffffffffffffff9c}) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x3, 0x408000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000180)=ANY=[@ANYBLOB="63060f00000000000066666e666666666666666666666666392c67e1535395092741b53b112b3e73915f843e282bdc77a157c2ebb8cce2a7397b83df469a839250e6ac40459537111fca62"]) 23:07:54 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\t\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:54 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x804, 0x40}, [{}]}, 0x78) 23:07:54 executing program 0: ioctl$VIDIOC_QBUF(0xffffffffffffff9c, 0xc058560f, &(0x7f0000000340)={0x4, 0xf, 0x4, 0x70000, {0x0, 0x7530}, {0x7, 0x1, 0x20, 0x2, 0xb0c, 0x1, "9dd9b6ce"}, 0x786, 0x2, @fd=0xffffffffffffff9c, 0x4}) writev(r0, &(0x7f00000009c0)=[{&(0x7f00000003c0)="88bee0d27b6296a5297b8374c21485799a54c6248b56f1cc8c24729cfac68bb1db", 0x21}, {&(0x7f0000000400)="c97652292b6f889abdcb5591fb478089011d731ba164325937c086174d9af6cb8f2e27fe19c52913b34a29e8d05aa665c12d215eb966495a728cd1fbcdf316e0405fdf5f50b6396c96", 0x49}, {&(0x7f0000000480)="a674e4ac5781abf289b501c71d9efa71a6ac3d3db0097711caef18d654b6086719892b9f38bbf40eb5be65451a529ecb702412e69ffa90600a45f3e6cbcbcdd3742661fd0a64f389d1c2b3b423d7628b3ca0be27072755b3737fffa84cdf1b1aae420cd230570fe2cbbe69ab297c3495a91d7dcce08afe93ec8216c5bc203c575aa73a34c227cd66ff7e17745cc504e5af7ff4b4af95ce258bd40c81b68def15f535189d02886e091f357333523e94cfc3fa85c709fc47b2b4b79f7db950617960c9cdd1", 0xc4}, {&(0x7f0000000580)="1bff1de865290c3b988bb973cfc0d3c1bbc916287fe1fa92cd1dc249279713ee84af4e2132af59f2052ba1ea81d17b49b1a089e27b10b38fe3ab844e72a28b39f1e6bb46071648d853074f7228d201b1baf902637765d38d0a8a0158f155ea4bfce05478683b48f857a269330ebeed6e22b8aaa110da1442333901fd35bc", 0x7e}, {&(0x7f0000000600)="4f17f9f6ed3e9d389cbca5247184579495e46f0683cfe6d98540ad84307f19b2aaa1edd6446570ebbda17f10316554c74a3ef4e7f24d6fe5b1bf6736445dbe9121a171ab728048c63de72af374765579a19f868f13adde04e052560cd9b7529c16c62bd6aab52d7ceccff93a13885bc02828df41745b5daada3c7805249bf3e9ccc59e", 0x83}, {&(0x7f00000006c0)="fb21ae9c5383e702bf1bf5b6eb294b9bb78f814629bb716880e596959b6a11a11b1b8cfe95c58a2db8170033c2e34635d38d5af1c576d8c348d5d51326dc429b656a49abcd18e9f4b464606e5604d26cd9d49b87d87446461d531e2b5c9b37ebebdaa581cce81f7de965c20a672cb36530c8b249cff53ce04b28890204149cab100f274fe23d959bbb103a898490f9e90244ad8168fca51d77e14996ab8ca47d408d86c27d5e8ea791e4a2c278428c4dcd8974e941b7cc25740985af840f3a9118df09c4a50731d5bdc9d714883d773f53bcec9fe434576700273b5554aa6675391ba49f7a5d332e6bc61b166e77", 0xee}, {&(0x7f00000007c0)="dbbff9a22991236a277f92d309bea8f007c757095890232edf6ce28a5ae2654556c9e9d116abb469be9a0d2a48ef4f80670f75fad951408d0cb9a21652f700b61151a49b974df936d74c73661522db049688dfb9cf732076fc8d7590df2ca414c634177cfcb26710b48249d37f110e04658d0f5799470801e66a47ab3d95cab9089defa863fb0e0298b3e33c1785a66b5c699dcba0708592ecb26b7d14c72c8fbc9475c284c9ce8da1cc80909ad8d13d09931faa3bfe57d770e4ad0e11603287cb8edeb3d349daa472381a2ab48a84a4", 0xd0}, {&(0x7f00000008c0)="f700a43b482cb427c05e247cc552e107f96263f1590ce1d00b757b1478ef7892c356b9affc950bab5bd7794d4fbe5b5224abdd4ce1156709ecb3dc27b18e7d3e0ad38fe6eab566737ac6562e8da1c62f8e4db64fb44f81de8efcda2a2b833df3dc458d012e0b5d209c3df5cd5360ba6681d491a4dda4d2e479c108257da3e04adeaf1fa9b95f002cb5da707f85ded300e5de6a660942c22b36b9cd28c6c363889b63ff7183056a6d", 0xa8}, {&(0x7f0000000980)="c89e86acb7cac801c7ed977c05b1bddeb1e6450732b43291b426", 0x1a}], 0x9) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20ncci\x00', 0x12100, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000300)=0x100) openat$vhci(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhci\x00', 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xf1a, 0x2000) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000000140)={@in6={0xa, 0x4e24, 0x301, @local, 0x8}, {&(0x7f0000000040)=""/3, 0x3}, &(0x7f0000000080), 0x4}, 0xa0) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000200), &(0x7f0000000240)=0x4) 23:07:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_pts(0xffffffffffffff9c, 0x410000) ioctl(r0, 0xf2c, &(0x7f0000000140)="485aae51229ecb60f48770dfe3066cf917074d321766ae865fce65156c25eb9947b011a05ed31867586fe5ab68206110e5e2e628b8493fb78828269cb003e0da40769a85ad3765307214ddaab10bf0bc63fe2b5a5ed575e7539ea1957f3d6a1289ba7c7b45aa73ba0afe43a96ddc8f1acff75b90234c2b39e3419e6904d152c561f57141cb10e8a1526ecbec1d01cb8d0fb9d3e423e24b572a263e900319ca2fce896c413b79b56773a536b922b3672172cf1e79ef322dfdde47eef196e497f4467d8aa0685e4572c4b231aa6a03aa015f80b03d8f677e9a053e769a952cf8") mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) 23:07:54 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64MMAP\x00', &(0x7f0000000080)='.ppp0keyring)\x00', 0xe, 0x0) 23:07:54 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x40}, [{}]}, 0x78) 23:07:55 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f0000000040)={0x0, {0x1, 0x8804}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 23:07:55 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\n\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1400}}, {@commit={'commit'}}]}) 23:07:55 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='./file0\x00') r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x400000, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000100)=""/221) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) 23:07:55 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200, 0x40}, [{}]}, 0x78) 23:07:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getresuid(&(0x7f0000000600), &(0x7f00000005c0), &(0x7f0000000580)=0x0) syz_mount_image$vfat(&(0x7f0000000180)='vfat\x00', &(0x7f00000001c0)='./file0\x00', 0x7ff, 0x3, &(0x7f0000000340)=[{&(0x7f0000000200)="96a42a98db9cf2eea3054de91a9f2aa4294ad331e35a17482a12a87e0d0a6461ce26cca2afc6240783a31c05e1bb486c0fb2c6dc3d4a4c752ae18205a497eb0da659638a2dafaf902beeaa59591b880e177010a087833fa8cd14a9d5dd5e07e5124a04", 0x63, 0x81}, {&(0x7f0000000280)="d9090431c46a91e345c042c80a5a6bb7d0b7f2c4de9353a59df6bc23b45e1022dd024a62ba6ba284d1742cb312ec609afbf7f0918af0e89713d198d05f1bd48d171232b845f1b2e64869bc8ace0d7b85aa4005bcf1a29caf11c1c065dd3834bc29bebfed61679b5111445d9a49aea9b09761bf73343c83a0a9", 0x79, 0x4}, {&(0x7f0000000300)="51442ae1e5e2aaca19f6f59eb4a55898f149a7e1440375d8e8983aca41f8d65475e441f4178a380cb7fe92e4314cbabff015ac14", 0x34, 0x40}], 0x40000, &(0x7f0000000480)={[{@shortname_win95='shortname=win95'}, {@uni_xlate='uni_xlate=1'}], [{@func={'func', 0x3d, 'CREDS_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'user_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x0, 0x7f, 0x34, 0x7b, 0x76, 0x36, 0x33], 0x2d, [0x77, 0x77, 0x38], 0x2d, [0x36, 0x7f, 0x65], 0x2d, [0x76, 0x64, 0x64, 0x64], 0x2d, [0x36, 0x31, 0x77, 0x31, 0x75, 0x73, 0x64, 0x79]}}}, {@appraise_type='appraise_type=imasig'}, {@measure='measure'}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@euid_lt={'euid<', r0}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) mkdir(&(0x7f0000000140)='./file0\x00', 0x64) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB="636f6d6d69743d307866666666666666666666666666ff07000000"]) umount2(&(0x7f00000003c0)='./file0\x00', 0x8) 23:07:55 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00, 0x40}, [{}]}, 0x78) 23:07:55 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 501.736100] EXT4-fs: 11 callbacks suppressed [ 501.736112] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000001400,commit=0x0000000000000000, 23:07:55 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\x0f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:55 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) utimes(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x7530}, {0x0, 0x7530}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_pid(r2, &(0x7f0000000000), 0xfffffea6) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000040)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000140)={0x0, r4, 0xfffffffffffffff8}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000100)={r5, r6}) 23:07:55 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7800, 0x40}, [{}]}, 0x78) [ 501.832660] EXT4-fs (sda1): Unrecognized mount option "commit=0xfffffffffffff˙" or missing value 23:07:55 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.stat\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) 23:07:55 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\x10\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:55 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x400) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x8002, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000140)={r2, 0x8, 0x83, "d7e04b7900aab02677bef6d6f803ef7065ea83b4586f0d97656c37bf2373188b630a1b053c2ee61822222734ad8d286960b2ca03b32ee8f8ff34c3b402fd6af9ba415c3087d8013c9d837470d28ad038f2d435748260864d36dc597501984676254c86181e137e8fac349e461869301d1295b5626e9a30adfca6911c098ed3a73a9258"}, 0x8b) [ 502.020773] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000001400,commit=0x0000000000000000, 23:07:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x180f}}, {@commit={'commit'}}]}) 23:07:55 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8008, 0x40}, [{}]}, 0x78) 23:07:55 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x2, 0x80000) openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x0, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(serpent)\x00'}, 0x58) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='commit=0xffffnffffffffff9I\x00']) syz_open_dev$cec(&(0x7f0000000280)='/dev/cec#\x00', 0x0, 0x2) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f00000001c0)={{0x6c, @multicast1, 0x4e21, 0x2, 'ovf\x00', 0x1, 0x8, 0x6}, {@loopback, 0x4e23, 0x3, 0x8, 0x1ff, 0x9}}, 0x44) 23:07:55 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000180)='./file0\x00', 0x400000, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f00000001c0)={0x0, 0x0, [], @raw_data=[0x100, 0x8, 0x1f, 0x5b, 0x80000000, 0xffffffffffffffff, 0x0, 0x8, 0x2, 0xfffffffffffffffc, 0x1ff, 0x8, 0xc, 0x47, 0x7, 0x7, 0x9, 0xfffffffffffffff7, 0x8, 0x1, 0x5, 0x280000000, 0x9, 0x8000, 0xffffffffffffffff, 0x3, 0x6, 0x10000, 0x8, 0x80000000, 0x0, 0x4]}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) 23:07:55 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xeaC\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:55 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x41, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000380)='cpuset.memory_pressure\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000240)='cpuacct.usage_sys\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) write$vnet(r2, &(0x7f0000000500)={0x1, {&(0x7f0000000280)=""/121, 0x79, &(0x7f0000000440)=""/166, 0x1, 0x4}}, 0x5b) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_pid(r2, &(0x7f0000000000), 0xfffffea6) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x149000, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0xa, &(0x7f0000000100)=0x29f640d8, 0x4) ioctl$sock_bt_bnep_BNEPCONNDEL(r4, 0x400442c9, &(0x7f0000000080)={0x2, @random="6b54776eb393"}) ioctl$VIDIOC_S_FMT(r4, 0xc0d05605, &(0x7f0000000140)={0xd, @vbi={0x1, 0x3, 0x0, 0x33424752, [0xe11d, 0x6], [0xa86f, 0x5], 0x3}}) 23:07:55 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\x02Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) 23:07:55 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8800, 0x40}, [{}]}, 0x78) 23:07:55 executing program 0: add_key(&(0x7f0000000080)='big_key\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="2b8856538d485db2968e9e23aa03bc5f0f92c4ecb2b106a2e61a7e1bef055d90f6fc5bdcd128507608559668113b0425b64c65e60828c7c715dbdcee856d7e3020745982f00fc18c907ad0f1998807eb7c741959d90c9da96d413eb63c80c5e33f09d2c57a08fe2ccc5e5d0ae5e0af914bfdd3676ca49f8b75135f5dd28354ddbd0a63b3e3edcdbab20f1660bd73de1574da8f3f3a4feb1175ef4fea4c", 0x9d, 0xfffffffffffffff9) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80000, 0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000040)={0xa, 0x0, 0xdda, 0x77b45b61, 'syz0\x00', 0x3}) [ 502.292783] EXT4-fs (sda1): Unrecognized mount option "commit=0xffffnffffffffff9I" or missing value 23:07:55 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 23:07:55 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8001, 0x2000) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f000000c9c0)={{{@in6=@mcast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f000000cac0)=0xe8) getsockname$packet(r0, &(0x7f000000cb00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000cb40)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f000000cc00)={@loopback, @remote, 0x0}, &(0x7f000000cc40)=0xc) getsockname$packet(r0, &(0x7f000000cc80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ccc0)=0x14) getpeername$packet(r0, &(0x7f000000cd00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000cd40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f000000ce40)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f000000cf40)=0xe8) accept4$packet(r0, &(0x7f000000cf80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000cfc0)=0x14, 0x80800) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000d000)={'team0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f000000d080)={{{@in6=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f000000d180)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f000000d1c0)={@dev, @remote, 0x0}, &(0x7f000000d200)=0xc) accept4$packet(r0, &(0x7f000000d240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000d280)=0x14, 0x800) getpeername$packet(r0, &(0x7f000000d2c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d300)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000d340)={'hwsim0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f000000d380)={{{@in6=@dev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f000000d480)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f000000d4c0)={0x0, @dev, @loopback}, &(0x7f0000000280)=0xffffffffffffff67) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000d540)={'veth1_to_bond\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f000000dc80)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x401000}, 0xc, &(0x7f000000dc40)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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", @ANYRES16=r1, @ANYBLOB="080026bd7000fcdbdf250200000008000100", @ANYRES32=r2, @ANYBLOB="9001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400d58affff08000600", @ANYRES32=r3, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e67000000004c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001c0004008135ff075ca1e80e0000010302000000dc0000040f270000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000400000008000600", @ANYRES32=r4, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="1802020038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400080000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r8, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400f403000008000600", @ANYRES32=r9, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400050000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r10, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r11, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r12, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000008000300030000000800040001fcffff08000100", @ANYRES32=r13, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000180000008000600", @ANYRES32=r14, @ANYBLOB="08000100", @ANYRES32=r15, @ANYBLOB="3c00020038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000900000008000100", @ANYRES32=r16, @ANYBLOB="2002020038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400020000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r17, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400000000007c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000004c0004000200040000020000f10d000076a20000000028b801800000010008ff0800000005001e5700100000010494ff00020000ff03ff0103000000fbff00077f000000060004ad04000000400001002400010071756575655f6964000000000000000000000000000000000000000000000000080003000300000008000400ffff000008000600", @ANYRES32=r18, @ANYBLOB="38000100240001006c625f73746174735f7265667265961b0e4c6e746572766168000000000000000800030003000000080004000100000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000300000008000600", @ANYRES32=r19, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b00000008000400000400000800070000000000"], 0x684}, 0x1, 0x0, 0x0, 0x4000}, 0x80) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x9) 23:07:55 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0f\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) [ 502.436002] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000180f,commit=0x0000000000000000, 23:07:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1f00}}, {@commit={'commit'}}]}) 23:07:56 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff01, 0x40}, [{}]}, 0x78) 23:07:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-control\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002440)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000004c0)}, {&(0x7f0000000500)=""/159, 0x9f}, {&(0x7f00000005c0)=""/8, 0x8}, {&(0x7f0000000600)=""/193, 0xc1}, {&(0x7f0000000700)=""/240, 0xf0}], 0x5, &(0x7f0000000880)=""/146, 0x92}, 0x503}, {{&(0x7f0000000940)=@can={0x1d, 0x0}, 0x80, &(0x7f0000001b40)=[{&(0x7f00000009c0)=""/9, 0x9}, {&(0x7f0000000a00)=""/4096, 0x1000}, {&(0x7f0000001a00)=""/59, 0x3b}, {&(0x7f0000001a40)=""/198, 0xc6}], 0x4}}, {{&(0x7f0000001b80)=@caif=@dgm, 0x80, &(0x7f0000002200)=[{&(0x7f0000001c00)=""/50, 0x32}, {&(0x7f0000001c40)=""/80, 0x50}, {&(0x7f0000001cc0)=""/184, 0xb8}, {&(0x7f0000001d80)=""/136, 0x88}, {&(0x7f0000001e40)=""/243, 0xf3}, {&(0x7f0000001f40)=""/148, 0x94}, {&(0x7f0000002000)=""/151, 0x97}, {&(0x7f00000020c0)}, {&(0x7f0000002100)=""/225, 0xe1}], 0x9}, 0xd3}, {{&(0x7f00000022c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002340)=""/99, 0x63}], 0x1, &(0x7f0000002400)=""/38, 0x26}, 0x5}], 0x4, 0x40002041, &(0x7f0000002540)={0x0, 0x989680}) r2 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002580)={{{@in=@empty, @in6=@dev={0xfe, 0x80, [], 0x24}, 0x4e21, 0x0, 0x4e22, 0x2, 0xa, 0x20, 0x80, 0x0, r1, r2}, {0x2, 0x6, 0xffff, 0x1000, 0x1f, 0x100000000, 0x9}, {0xfffffffffffffff9, 0x4, 0xd60}, 0x1, 0x6e6bb9, 0x3, 0x1, 0x1, 0x4c67e40df7174bce}, {{@in=@dev={0xac, 0x14, 0x14, 0xe}, 0x4d3, 0x3c}, 0x0, @in6=@mcast1, 0x3502, 0x2, 0x3, 0x101, 0x7f, 0x8, 0x7}}, 0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) mount$9p_rdma(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x2000000, &(0x7f0000000300)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@rq={'rq', 0x3d, 0x3ff}}, {@timeout={'timeout', 0x3d, 0xbd8}}, {@timeout={'timeout', 0x3d, 0x71}}, {@timeout={'timeout', 0x3d, 0xfffffffffffffffa}}, {@timeout={'timeout', 0x3d, 0x800}}], [{@obj_role={'obj_role', 0x3d, 'commit'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@seclabel='seclabel'}, {@audit='audit'}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise_type='appraise_type=imasig'}, {@fsuuid={'fsuuid', 0x3d, {[0x67, 0x37, 0x33, 0x77, 0x77, 0x33, 0x77], 0x2d, [0x66, 0x7d, 0x61, 0x3f], 0x2d, [0x32, 0x35, 0x35, 0x7b], 0x2d, [0x39, 0x75, 0x63, 0x32], 0x2d, [0x34, 0x3f, 0x32, 0x66, 0x35, 0x73, 0x77, 0x77]}}}, {@dont_measure='dont_measure'}, {@uid_lt={'uid<', r3}}, {@hash='hash'}]}}) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@commit={'commit', 0x3d, 0xfffffffffffffff9}}]}) 23:07:56 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='./file0\x00') 23:07:56 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x10\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) [ 502.556940] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000180f,commit=0x0000000000000000, 23:07:56 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x2) 23:07:56 executing program 0: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='./file0\x00') 23:07:56 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f, 0x40}, [{}]}, 0x78) 23:07:56 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x3) [ 502.744847] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000001f00,commit=0x0000000000000000, 23:07:56 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) mount$9p_rdma(&(0x7f0000000080)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x40, &(0x7f00000011c0)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@common=@fscache='fscache'}, {@timeout={'timeout', 0x3d, 0x5}}, {@sq={'sq'}}, {@timeout={'timeout', 0x3d, 0x10000}}, {@timeout={'timeout', 0x3d, 0xfffffffffffffbff}}], [{@fsname={'fsname', 0x3d, 'memory.events\x00'}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '$]#'}}]}}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) getdents64(r0, &(0x7f00000001c0)=""/4096, 0x1000) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 23:07:56 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23c22, 0x40}, [{}]}, 0x78) 23:07:56 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$isdn(0x22, 0x3, 0x21) 23:07:56 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x4) 23:07:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x3) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f00000001c0)=ANY=[@ANYBLOB="636f6d6d69743d3078666660666666666666666666666666392c002fa356f1b49b589db2549970bf56b58a57a355b3888073a9bafb68c27970249ca93c0b7261306d0fb680f9c4359e18a91f1dcc019078ac78651427ed20de012a56b7d51058a594f82d644f565aaca2a29bbd3c929ba7447d72d56e5fdd6ce7fa0dd89c8eed9491ba46f0216b7eda68132d83683a8994b126b9a29332d3b6fe04de3138bed29de92ff487ba19670f04d1b7cd"]) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) accept4(r0, 0x0, &(0x7f0000000100), 0x80000) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f0000000180)=@v1={0x1000000, [{0x81, 0x6}]}, 0xc, 0x3) 23:07:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2000}}, {@commit={'commit'}}]}) [ 503.475676] EXT4-fs (sda1): Unrecognized mount option "commit=0xff`ffffffffffff9" or missing value [ 503.534721] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000002000,commit=0x0000000000000000, [ 503.546407] ================================================================== [ 503.554107] BUG: KASAN: use-after-free in __ext4_expand_extra_isize+0x16c/0x240 [ 503.561547] Write of size 256 at addr ffff88807ae14180 by task syz-executor3/7745 [ 503.569158] [ 503.570786] CPU: 1 PID: 7745 Comm: syz-executor3 Not tainted 5.0.0-rc2+ #29 23:07:56 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x6) 23:07:57 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x40}, [{}]}, 0x78) 23:07:57 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='auxv\x00') getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x3, 0x0, 0x4d8d, 0xffffffffffff0000}, &(0x7f00000002c0)=0x18) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0x7f, "b1a84d04fd8e836548eb52da65453aa35e2bfca7bc922d267e5f9285bfb0cb6a8f3afa27ed8d1fb37ce78320cf8e1e8a56a44b3e6d33c433feaaee7a7572b2286c63d4b80ad2c960ed82ada1a05be29d21d6c7a28c992a33eac82320c3fbc60cb34e5758feaaecfc9dc9d204945c451116e7f62313d178827e8458285a5b96"}, &(0x7f00000003c0)=0x87) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000400)={r2, 0x5f}, 0x8) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000440)=0xf6, 0x4) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x188000, &(0x7f0000000140)={'trans=unix,', {[{@cache_mmap='cache=mmap'}, {@privport='privport'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'vboxnet0@vboxnet1nodev-!^'}}, {@fsname={'fsname', 0x3d, 'cgroupppp1system'}}, {@fsuuid={'fsuuid', 0x3d, {[0x77, 0x76, 0x0, 0x62, 0x79, 0x67, 0x34, 0x36], 0x2d, [0x0, 0x75, 0x75, 0x39], 0x2d, [0x36, 0x36, 0x7e, 0x7f], 0x2d, [0x76, 0x66, 0x37, 0x65], 0x2d, [0x39, 0x77, 0x66, 0x64, 0x39, 0x65, 0x36, 0x77]}}}, {@subj_role={'subj_role', 0x3d, 'trustedselinux'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&vmnet1md5sumppp1system'}}]}}) [ 503.577875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 503.587218] Call Trace: [ 503.589803] dump_stack+0x1db/0x2d0 [ 503.593432] ? dump_stack_print_info.cold+0x20/0x20 [ 503.598444] ? ext4_mark_inode_dirty+0x781/0xb80 [ 503.603201] ? __ext4_expand_extra_isize+0x16c/0x240 [ 503.608303] print_address_description.cold+0x7c/0x20d [ 503.613583] ? __ext4_expand_extra_isize+0x16c/0x240 [ 503.618684] ? __ext4_expand_extra_isize+0x16c/0x240 [ 503.623788] kasan_report.cold+0x1b/0x40 [ 503.627850] ? __ext4_expand_extra_isize+0x16c/0x240 [ 503.632954] check_memory_region+0x123/0x190 [ 503.637354] memset+0x24/0x40 [ 503.640457] __ext4_expand_extra_isize+0x16c/0x240 [ 503.645383] ext4_mark_inode_dirty+0x827/0xb80 [ 503.649969] ? ext4_expand_extra_isize+0x5c0/0x5c0 [ 503.654892] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 503.660430] ? current_time+0x104/0x1b0 [ 503.664405] ? kasan_check_write+0x14/0x20 [ 503.668641] ext4_unlink+0xe8a/0x1210 [ 503.672444] ? ext4_rmdir+0xd80/0xd80 [ 503.676244] ? down_write+0x8a/0x130 [ 503.679954] ? vfs_unlink+0xd1/0x500 [ 503.683665] ? down_read+0x120/0x120 [ 503.687377] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 503.692906] ? may_delete+0x417/0x5f0 [ 503.696702] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 503.702235] vfs_unlink+0x2d8/0x500 [ 503.705857] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 503.711394] do_unlinkat+0x52a/0x9e0 [ 503.715109] ? __ia32_sys_rmdir+0x40/0x40 [ 503.719250] ? digsig_verify.cold+0x32/0x32 [ 503.723579] ? trace_hardirqs_on+0xbd/0x310 [ 503.727901] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 503.733428] ? getname_flags+0x277/0x5b0 [ 503.737485] __x64_sys_unlink+0x42/0x50 [ 503.741458] do_syscall_64+0x1a3/0x800 [ 503.745347] ? syscall_return_slowpath+0x5f0/0x5f0 [ 503.750275] ? prepare_exit_to_usermode+0x232/0x3b0 [ 503.755290] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 503.760139] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 503.765332] RIP: 0033:0x457c17 [ 503.768527] Code: 00 66 90 b8 58 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ed b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 503.787431] RSP: 002b:00007fffc685ab28 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 503.795141] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457c17 [ 503.802417] RDX: 00007fffc685ab40 RSI: 00007fffc685ab40 RDI: 00007fffc685abd0 [ 503.809692] RBP: 0000000000000a33 R08: 0000000000000000 R09: 0000000000000011 [ 503.816965] R10: 000000000000000a R11: 0000000000000246 R12: 00007fffc685bc60 [ 503.824244] R13: 0000000000aaa940 R14: 0000000000000000 R15: 0000000000000003 [ 503.831530] [ 503.833170] The buggy address belongs to the page: [ 503.838102] page:ffffea0001eb8500 count:0 mapcount:-128 mapping:0000000000000000 index:0x1 [ 503.846511] flags: 0x1fffc0000000000() [ 503.850421] raw: 01fffc0000000000 ffffea0001f0df08 ffffea0001d00208 0000000000000000 [ 503.858315] raw: 0000000000000001 0000000000000002 00000000ffffff7f 0000000000000000 [ 503.866198] page dumped because: kasan: bad access detected [ 503.871904] [ 503.873531] Memory state around the buggy address: [ 503.879007] ffff88807ae14080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 503.886370] ffff88807ae14100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 503.893736] >ffff88807ae14180: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 503.901094] ^ [ 503.904468] ffff88807ae14200: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 503.911833] ffff88807ae14280: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 503.919192] ================================================================== [ 503.926562] Disabling lock debugging due to kernel taint [ 503.933165] Kernel panic - not syncing: panic_on_warn set ... [ 503.936022] kobject: 'loop1' (00000000617ddba3): kobject_uevent_env [ 503.939066] CPU: 1 PID: 7745 Comm: syz-executor3 Tainted: G B 5.0.0-rc2+ #29 [ 503.939074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 503.939081] Call Trace: [ 503.965883] dump_stack+0x1db/0x2d0 [ 503.969505] ? dump_stack_print_info.cold+0x20/0x20 [ 503.974628] panic+0x2cb/0x65c [ 503.977832] ? add_taint.cold+0x16/0x16 [ 503.981815] ? __ext4_expand_extra_isize+0x16c/0x240 [ 503.985275] kobject: 'loop1' (00000000617ddba3): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 503.986924] ? preempt_schedule+0x4b/0x60 [ 503.986937] ? ___preempt_schedule+0x16/0x18 [ 503.986951] ? trace_hardirqs_on+0xb4/0x310 [ 504.009272] ? __ext4_expand_extra_isize+0x16c/0x240 [ 504.014388] end_report+0x47/0x4f [ 504.017850] ? __ext4_expand_extra_isize+0x16c/0x240 [ 504.022956] kasan_report.cold+0xe/0x40 [ 504.026942] ? __ext4_expand_extra_isize+0x16c/0x240 23:07:57 executing program 0: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200, 0x0) lgetxattr(&(0x7f0000001a00)='./file0\x00', &(0x7f0000001cc0)=@known='trusted.overlay.impure\x00', &(0x7f0000001d00)=""/199, 0xc7) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000001b00)=[{{&(0x7f0000000040)=@tipc=@name, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/66, 0x42}], 0x1, &(0x7f0000000200)=""/7, 0x7}, 0xfff}, {{&(0x7f0000000240)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/132, 0x84}], 0x1}, 0x3a}, {{0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000003c0)=""/84, 0x54}, {&(0x7f0000000440)=""/4, 0x4}, {&(0x7f0000000480)=""/68, 0x44}, {&(0x7f0000000500)=""/107, 0x6b}, {&(0x7f0000000580)=""/27, 0x1b}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/122, 0x7a}, {&(0x7f0000001640)=""/189, 0xbd}], 0x8, &(0x7f0000001780)=""/77, 0x4d}}, {{&(0x7f0000001800)=@pppol2tpin6, 0x80, &(0x7f00000019c0)=[{&(0x7f0000001880)=""/236, 0xec}, {&(0x7f0000001980)=""/27, 0x1b}], 0x2}, 0x9}, {{0x0, 0x0, &(0x7f0000001a00), 0x0, &(0x7f0000001a40)=""/151, 0x97}, 0x8}], 0x5, 0x0, &(0x7f0000001c80)={r1, r2+10000000}) [ 504.027038] kobject: 'loop5' (000000001afcef19): kobject_uevent_env [ 504.032046] check_memory_region+0x123/0x190 [ 504.032060] memset+0x24/0x40 [ 504.032076] __ext4_expand_extra_isize+0x16c/0x240 [ 504.032090] ext4_mark_inode_dirty+0x827/0xb80 [ 504.032104] ? ext4_expand_extra_isize+0x5c0/0x5c0 [ 504.052976] kobject: 'loop5' (000000001afcef19): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 504.055471] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 504.055492] ? current_time+0x104/0x1b0 [ 504.065820] kobject: 'loop0' (00000000a6bb8baf): kobject_uevent_env [ 504.069838] ? kasan_check_write+0x14/0x20 [ 504.069857] ext4_unlink+0xe8a/0x1210 [ 504.088582] kobject: 'loop0' (00000000a6bb8baf): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 504.089958] ? ext4_rmdir+0xd80/0xd80 [ 504.089978] ? down_write+0x8a/0x130 [ 504.110693] ? vfs_unlink+0xd1/0x500 [ 504.114410] ? down_read+0x120/0x120 [ 504.118130] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 504.123673] ? may_delete+0x417/0x5f0 [ 504.127478] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 504.133022] vfs_unlink+0x2d8/0x500 [ 504.136661] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 504.142204] do_unlinkat+0x52a/0x9e0 [ 504.145930] ? __ia32_sys_rmdir+0x40/0x40 [ 504.150089] ? digsig_verify.cold+0x32/0x32 [ 504.154419] ? trace_hardirqs_on+0xbd/0x310 [ 504.158748] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 504.164301] ? getname_flags+0x277/0x5b0 [ 504.168376] __x64_sys_unlink+0x42/0x50 [ 504.172359] do_syscall_64+0x1a3/0x800 [ 504.176257] ? syscall_return_slowpath+0x5f0/0x5f0 [ 504.181197] ? prepare_exit_to_usermode+0x232/0x3b0 23:07:57 executing program 5: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x27a, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x40}, [{}]}, 0x78) [ 504.186221] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 504.191079] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 504.196271] RIP: 0033:0x457c17 [ 504.199477] Code: 00 66 90 b8 58 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ed b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 504.218381] RSP: 002b:00007fffc685ab28 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 504.226094] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457c17 [ 504.233370] RDX: 00007fffc685ab40 RSI: 00007fffc685ab40 RDI: 00007fffc685abd0 [ 504.240643] RBP: 0000000000000a33 R08: 0000000000000000 R09: 0000000000000011 [ 504.247917] R10: 000000000000000a R11: 0000000000000246 R12: 00007fffc685bc60 [ 504.255194] R13: 0000000000aaa940 R14: 0000000000000000 R15: 0000000000000003 [ 504.263725] Kernel Offset: disabled [ 504.267351] Rebooting in 86400 seconds..