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"], @ANYRESOCT=r3, @ANYBLOB="32647f56fb3d099d18e93d0bdb01140b921df2c372372a6f632329e7e61f18068e8fa21a8a9850f4890cc57a53dd344587e7062888ed478c5e036fae3ccfa76d75840df466669750c89e064d5e2050613c3b20c9215bc7046efe788fd36a3bb0cb467e1a8eb30ab500ef19a4d9fc1a1096653bc74c9060996fb0076aa18b4b99c93a61a811a7849cf5c76691631994fae83dd0cd67e0a0202a7216be6b21aa2179fb6c81f914f56f5f32ac128b5872018cce6f547422562ccc04a214249f2a643d2f61d7761d2050a89cc6bfd7ee00ac8e2800c2734133787ad38590984154a145", @ANYPTR=&(0x7f0000001f00)=ANY=[@ANYPTR, @ANYRESDEC=r3], @ANYRESHEX=r2, @ANYPTR=&(0x7f0000001800)=ANY=[@ANYRESHEX=r3, @ANYRESHEX=r0, @ANYRESHEX=0x0, @ANYRESDEC=r0, @ANYPTR=&(0x7f0000001640)=ANY=[@ANYRESOCT=r1, @ANYPTR64, @ANYBLOB="d43f551c6d8df0d1728313cd2b673f83ea49c8e23d65323e09316c39302f163337612f69743d5a6fbce4dbbb4ef23a938019823980e43c9da3a0523eb5c948b1021b13ca9cddc07ec8e6388e813f474f8fba4bf054220738305f3c0e3bd43e6e5da0a2647de7b5ef4538d8551cd8f22c", @ANYPTR64, @ANYRES32=r0, @ANYRES64=r2, @ANYBLOB="9f8d7181b6b50ab0f49ffd0a2d4b08cd7101a87029e2864aec42727aa52df6d7930c8cc64241bb355f25b023aeda2754fc8e4396aec43dd0de3883fcf34c0b7f203fa6f0996e2a3ef2cde1704a6e1cbb32176d9006e6af10beeca64000aa0145ec3e8cabe3a1b658c1abc9cb5102437ee771cd4817aaa6cc7d7bed354669e817083d919a19a43382d51ccef51c7b8e052bfee842d916942ce7afb90f7cdfd05e8ce3bb3e55d1d1522dc194562071631e15160d", @ANYRES64=r2], @ANYPTR64=&(0x7f00000017c0)=ANY=[@ANYRES16=r0]], @ANYPTR=&(0x7f0000001900)=ANY=[@ANYRESHEX=r3, @ANYRES64=r2, @ANYBLOB="0c3dd36592792f309789a1da858b6b0001976b8e51ec627e698a080955d539fadfd917153f4fa7b257a0f80a9b77e89009a3bf375f96e0f12afc6aaccea397e0a9de5ef316bdffbe4e2379e9192808c6", @ANYPTR64=&(0x7f0000001880)=ANY=[@ANYRESHEX=r0, @ANYRESHEX, @ANYRESOCT=r2, @ANYRESHEX=r0], @ANYRESDEC=0x0, @ANYRESHEX=r0], @ANYRESHEX=r2, @ANYPTR=&(0x7f0000001bc0)=ANY=[@ANYRES16=0x0, @ANYPTR=&(0x7f00000019c0)=ANY=[@ANYRES32=r0, @ANYBLOB='2v', @ANYBLOB="edf8bf6bbbbba522e73b3b5508f7e410e48d62cf1f08f4f754c74e27d26f97d4a6bc61ae1e06f9222e8f7ace798c5ab1cd501f8fe4d6a7547192d547b6909fa4e4f49103051e4a31fb8a6b013c49d175072833ecb5f3190e95b000184f1d0f5d7c2d42a37716bf0a51a44f36266b6576e0be788cd10f08", @ANYPTR, @ANYRESDEC=r1, @ANYRES16=r2], @ANYRESDEC=r2, @ANYRESOCT=r2, @ANYPTR=&(0x7f0000001a80)=ANY=[@ANYRESOCT=r2, @ANYRESDEC=r0, @ANYRES32=r3, @ANYBLOB="ef799bb444bccfbd46128642732b0ef04a4da17e102795fb67c78052a3defbde53b778181a710e38074f6ff6d595732710f632d0ca5b2ce4f8b2006196480d37fe842903e712bb9a05732abad2645df61f48d3a18ca1ef5777a709745171a1c093593d0c20fd3ee81935345ccf141b90a4f888ad829eed5f69c6e8f12ab4ac3dfe7920c7972e79a4419aad22ee2c5b5ab498b1d990dc1c865f41b5d44a838c0812103a1fee9d2f5812e0c9f360f1b214eea72a0ecf23e75fe57568b94eb7bc836fcd4fb82517e61f93f5f3c410db9c3fa4fa01b114d5"], @ANYBLOB, @ANYRESOCT=r3, @ANYBLOB="036f83101cac3cf37a06567299b7c1fe33c556bb394278fb44810f2b95eddc5a078613e8637886d43381cae96e98b84c912dce6c8696e991529c33f7a5914025fda3b33b6fb0ffbd5e2f006768d1eb81531be97e9985e08e490e0cbf031368d8b98926636753fc076a831d00622db39b89eae6a86d721ac4efdbac2599ac7b72366fef85f82d99faf2ef90997ef531d81f29392f361d68eab7bdcc1406ad730fa761f847fca618d77891ceaebf1a63a1adb670de602afbbc70bf5dd7aaa6dd46"]], 0xeee0f78cfe61336e) pkey_alloc(0x0, 0x3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) [ 301.161129][T14877] EXT4-fs (sda1): Unrecognized mount option "debu%_want_extra_isize=0x0000000000000000" or missing value 20:41:01 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0x0, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:01 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debup_want_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:01 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:02 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x800000) 20:41:02 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x48000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:02 executing program 5: ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, &(0x7f0000000000)={0x4, 0xd9}) setxattr$security_smack_entry(&(0x7f0000000440)='./file0\x00', &(0x7f0000000040)='security.SMACK64MMAP\x00\xbf\a\xd3\x83E\v5L\xcf^\'\xf1\xb0', 0x0, 0x0, 0x0) 20:41:02 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x101, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f00000002c0)={0x16, 0x8a, &(0x7f0000000200)="fbe34fa93bb01addd1b116887d0fed91954d019314bbb8b783ed1fbae1395f972b2bf3824701c172845fe6f4912131f7b5f931ba11a03b36ae55026c529f2089b6a7a510d2f55428b6cbd51473364136dbb7d723d97957e229a6dc15265bed9a743fed9025a9e34cb939332673bbeb886001f11f5d91eee41895d0e29025c14ece81fe0a6ec2b190cd99"}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x0) getsockname$netrom(r0, &(0x7f0000000040)={{}, [@rose, @rose, @default, @bcast, @default, @remote, @bcast, @default]}, &(0x7f0000000100)=0x48) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x6, 0x7, 0x80000000, 0x9, 0x0, 0x5, 0x200, 0x0, 0x8, 0x40, 0x101, 0xfffffffffffffffd, 0xfffffffffffff3a8, 0xff, 0xffffffffffff08c9, 0xffffffffffffffff, 0x0, 0x7, 0x27, 0x1000, 0x3, 0x0, 0x6, 0x0, 0xfff, 0x1000, 0x4, 0x2, 0x8c, 0x40, 0x5c4ba2ab, 0x5, 0x0, 0x2, 0x7, 0x1, 0x0, 0x7, 0x5, @perf_bp={&(0x7f0000000300), 0x1}, 0x200, 0x7fff, 0x7457, 0x1, 0x2, 0xfffffffffffffffa, 0x1}, r5, 0x8, r1, 0x9) [ 301.425680][T14894] EXT4-fs (sda1): Unrecognized mount option "debup_want_extra_isize=0x0000000000000000" or missing value 20:41:02 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x0, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:02 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x1000000) 20:41:02 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:02 executing program 5: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='security.SMACK64MMAP\x00', 0x0, 0xffffffffffffff5e, 0xfffffc) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000000), 0x4) [ 301.552809][T14904] EXT4-fs (sda1): Unrecognized mount option "debup_want_extra_isize=0x0000000000000000" or missing value 20:41:02 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x1660200) 20:41:02 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debugpwant_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:02 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x68000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:02 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40040, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000040)={0x5da, 0x3, 0x100}, 0xc) creat(&(0x7f0000000080)='./file0\x00', 0x80) setxattr$security_smack_entry(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.SMACK64IPOUT\x00', 0x0, 0x0, 0x10000005) 20:41:02 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x0, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:02 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x8) setxattr$security_smack_entry(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='security.SMACK64MMAP\x00', 0x0, 0xfe7a, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="a7439eeefe41b4bf41bc9e362ef79b79a758abc442e4e968c5345591ad1f064cfc981f5b91884f2c8602cf90ff159cbd3786e92ef138215f198c870dbb4aae63cb71c677d037b4656c60097e66231db9d372c71dde066801de", 0x59, 0x1}], 0x58090, &(0x7f0000000180)={[{@nosuiddir='nosuiddir'}, {@suiddir='suiddir'}, {@nodiscard='nodiscard'}, {@norecovery='norecovery'}], [{@dont_appraise='dont_appraise'}, {@fsmagic={'fsmagic', 0x3d, 0xfff}}, {@smackfsroot={'smackfsroot', 0x3d, 'security.SMACK64MMAP\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, 'security.SMACK64MMAP\x00'}}]}) [ 301.850151][T14927] EXT4-fs (sda1): Unrecognized mount option "debugpwant_extra_isize=0x0000000000000000" or missing value 20:41:02 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:02 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x0) getsockname$netrom(r0, &(0x7f0000000040)={{}, [@rose, @rose, @default, @bcast, @default, @remote, @bcast, @default]}, &(0x7f0000000100)=0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x20, 0x200) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) 20:41:02 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x2000000) 20:41:02 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x74000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:02 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x80, 0x0) write$FUSE_OPEN(r0, &(0x7f00000000c0)={0x344, 0xffffffffffffffda, 0x6}, 0xfe9d) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) getresuid(&(0x7f00000001c0)=0x0, &(0x7f0000000200), &(0x7f0000000240)) r3 = getgid() write$FUSE_ATTR(r0, &(0x7f0000000280)={0x78, 0xfffffffffffffffe, 0x6, {0x7fff, 0x6, 0x0, {0x3, 0x7, 0x0, 0x7, 0x0, 0x8, 0x3, 0x2eef4000000, 0x1000, 0x8, 0x0, r2, r3, 0x4, 0x2}}}, 0x78) fcntl$notify(r1, 0x402, 0x10) setxattr$security_smack_entry(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000100)=0x7) r4 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r4, &(0x7f00000003c0)) accept$nfc_llcp(r0, 0x0, &(0x7f0000000140)) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000040)=0x2) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x400, 0x0) setxattr$security_selinux(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='security.selinux\x00', &(0x7f0000000380)='system_u:object_r:systemd_notify_exec_t:s0\x00', 0x2b, 0x1) 20:41:02 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x0, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:02 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_\nant_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) [ 302.325217][T14950] EXT4-fs (sda1): Unrecognized mount option "debug_ [ 302.325217][T14950] ant_extra_isize=0x0000000000000000" or missing value 20:41:03 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x4000000) 20:41:03 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 20:41:03 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:03 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x0, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:03 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:03 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x0) getsockname$netrom(r1, &(0x7f0000000040)={{}, [@rose, @rose, @default, @bcast, @default, @remote, @bcast, @default]}, &(0x7f0000000100)=0x48) r2 = openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.stat\x00', 0x7a05, 0x1700) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000140)={0xfffffffffffffffb, 0x1, 0x8, 0x8, 0xf, 0x200, 0x7, 0x0, 0x100000001, 0xd84c}) ioctl$KVM_S390_VCPU_FAULT(r2, 0x4008ae52, &(0x7f0000000000)=0x7) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000240)={0x0, 0x3}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000002c0)={r3, 0x8}, 0x8) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f0000000300)={0xf004, 0x8000}) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) mlockall(0x0) 20:41:03 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x6000000) 20:41:03 executing program 5: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000000)) [ 302.545905][T14965] EXT4-fs (sda1): Unrecognized mount option "debug_ [ 302.545905][T14965] ant_extra_isize=0x0000000000000000" or missing value 20:41:03 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dlm-monitor\x00', 0x42100, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000006c0)={0x0, 0x7, 0xfa00, {0x1, &(0x7f00000003c0)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000440)={0x13, 0x10, 0xfa00, {&(0x7f00000004c0), r1}}, 0x18) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$UI_SET_SNDBIT(r2, 0x4004556a, 0x7) statx(r2, &(0x7f0000000040)='./file0\x00', 0x7800, 0x200, &(0x7f0000000080)) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={r2, &(0x7f00000001c0)="a3d235d7a7df20305a206fc3dc6bd58c58e244fbcb63d005901bd896981693ccec3c2fa8ff5fc9b99f32744a6870837616527fee9fbbda44dba5459425634fe994de1b6e718718d64f1bf7475ed066292961c1a7ea1c872a1d7b0f81eb325950cdc253e8cb2fdef866d128a19d32e9fce01cf7f885cc6e09228e64b60b64d39fdfc2f4300ff62ba7c970c1d79e7c02c4", &(0x7f0000000280)=""/73}, 0x18) set_thread_area(&(0x7f0000000340)={0x0, 0x20000000, 0xffffffffffffffff, 0x7fff, 0x400000008000, 0x0, 0x8, 0x0, 0x1, 0x20}) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000480)='security.SMACK64MMAP\x00', 0x0, 0xffffff95, 0x0) 20:41:03 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xc0000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:03 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x7000000) 20:41:03 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_w\nnt_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:03 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x0, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:03 executing program 5: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000000)=0xa4b3, 0x4) setxattr$security_smack_entry(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 20:41:03 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000200)={0x2, 0x0, {0x3, 0x3, 0x10000, 0x0, 0x821}}) getsockname$netrom(r0, &(0x7f0000000040)={{}, [@rose, @rose, @default, @bcast, @default, @remote, @bcast, @default]}, &(0x7f0000000100)=0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) 20:41:03 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0xc000000) 20:41:03 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xc0ed0000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) [ 302.838486][T14996] EXT4-fs (sda1): Unrecognized mount option "debug_w [ 302.838486][T14996] nt_extra_isize=0x0000000000000000" or missing value 20:41:03 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r1, 0x208204) r2 = open(&(0x7f0000000140)='./bus\x00', 0x14102e, 0x0) fallocate(r2, 0x0, 0x0, 0x7) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r2, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000003700)={0x0, 0x40000000000006, 0x100000001, 0x0, 0xca}) 20:41:03 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf5ffffff, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:03 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x0, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:03 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0xd000000) 20:41:03 executing program 5: [ 302.990904][T15007] EXT4-fs (sda1): Unrecognized mount option "debug_w [ 302.990904][T15007] nt_extra_isize=0x0000000000000000" or missing value 20:41:03 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:03 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_w%nt_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:03 executing program 5: 20:41:03 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x0, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 303.266174][T15022] EXT4-fs (sda1): Unrecognized mount option "debug_w%nt_extra_isize=0x0000000000000000" or missing value 20:41:04 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x0) getsockname$netrom(r0, &(0x7f0000000040)={{}, [@rose, @rose, @default, @bcast, @default, @remote, @bcast, @default]}, &(0x7f0000000100)=0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='./file0\x00') write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) 20:41:04 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x12000000) 20:41:04 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf8f73f00, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:04 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000300), 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) 20:41:04 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x0, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:04 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_wpnt_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:04 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfcfdffff, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:04 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x3f000000) 20:41:04 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x8bffffff) 20:41:04 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:04 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x0, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000003031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) 20:41:04 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x0) getsockname$netrom(r0, &(0x7f0000000040)={{}, [@rose, @rose, @default, @bcast, @default, @remote, @bcast, @default]}, &(0x7f0000000100)=0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) 20:41:04 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_wa\nt_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:04 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x8cffffff) 20:41:04 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffdfc, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:04 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x0, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:04 executing program 5: clone(0x200000041fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000140)) ptrace(0x10, r0) ptrace$getenv(0x4201, r0, 0x0, 0x0) 20:41:04 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0xe4ffffff) 20:41:04 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffdfd, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:04 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x0, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:05 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:05 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0xf6ffffff) 20:41:05 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_wa%t_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:05 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x0) getsockname$netrom(r0, &(0x7f0000000040)={{}, [@rose, @rose, @default, @bcast, @default, @remote, @bcast, @default]}, &(0x7f0000000100)=0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(r1, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) 20:41:05 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffff5, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:05 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x0, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:05 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0xfeffffff) 20:41:05 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_wapt_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:05 executing program 5: ioprio_get$uid(0x400000000003, 0x0) 20:41:05 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0xff010000) 20:41:05 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:05 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x0, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:05 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0xff0f0000) 20:41:05 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:05 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_wan\n_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:06 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000200)={0x5, 0xfffffffffffffffc, 0xfd34, 0xb7e, 0x7}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x0) getsockname$netrom(r0, &(0x7f0000000040)={{}, [@rose, @rose, @default, @bcast, @default, @remote, @bcast, @default]}, &(0x7f0000000100)=0x48) getpeername$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000280)=0x1c) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) 20:41:06 executing program 5: socket$inet(0x2, 0x80001, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, 0x0) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) rt_sigprocmask(0x1, 0x0, &(0x7f00000000c0), 0x0) rt_sigpending(&(0x7f0000000000), 0x8) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x54}, 0x98) 20:41:06 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x0, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:06 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xedc000000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:06 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0xffffff7f) 20:41:06 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_wan%_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:06 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:06 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0xffffff8b) 20:41:06 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x0, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:06 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:06 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000200)={{0x5e, @dev={0xac, 0x14, 0x14, 0x23}, 0x4e23, 0x0, 'dh\x00', 0x0, 0x100000001, 0x5e}, {@empty, 0x4e23, 0x3, 0x7, 0x8}}, 0x44) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x200, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000280)={@empty, @remote, 0x1, 0x9, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @rand_addr=0x3, @multicast1, @local]}, 0x34) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x0) getsockname$netrom(r0, &(0x7f0000000040)={{}, [@rose, @rose, @default, @bcast, @default, @remote, @bcast, @default]}, &(0x7f0000000100)=0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(r2, 0x0, 0x7a0f, 0x1700) 20:41:06 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_wantpextra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:06 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x8000000000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:06 executing program 5: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x83) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000000)=0x1) syncfs(r0) fsetxattr$security_selinux(r0, &(0x7f00000001c0)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:initrc_var_run_t:s0\x00', 0x26, 0x2) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa004000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x300, 0x70bd26, 0x25dfdbfb, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000890}, 0x24044040) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000240)={0xf, {0x6, 0x8, 0x94b4, 0x1}}) setxattr$security_smack_entry(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 20:41:06 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0xffffff8c) 20:41:06 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x0, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:06 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10000000000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) [ 306.101801][T15179] EXT4-fs: 14 callbacks suppressed [ 306.101816][T15179] EXT4-fs (sda1): Unrecognized mount option "debug_wantpextra_isize=0x0000000000000000" or missing value 20:41:06 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0xffffffe4) 20:41:06 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_\nxtra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:06 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40000000000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:06 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/mixer\x00', 0x111400, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000300)={0x0, 0xe6, "7ca7fe15c82cac3590f5006a72c93cde54af2bf11cd2ff98a4f76afa1fdde616245380da743e8b7a26819393a5deebf98062aded73dc6ca598373174ab36d8e36a665e8024fe0f21c40f7bdfdd6ea08b85a6eecbb357b4e0e9677290380e364a597b94bbc8f7b8a4bd0810fa73e68631f3be4d9914a2e03b4650f2ddf034a7be9605bf5cd0ec620e5c10755055c3f40a7ae1f5d7d0a5572d497a28e94486dd57932718d31feae59ac3aef754c5a7f7e76722fbddbcfbf7565483489d05d7e8b78dd2ab362d1a5ffe77d76dc0f2311465c56f4f323713000a15da381181c5a228caf1944179bf"}, &(0x7f0000000400)=0xee) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000440)={r2, 0x2}, &(0x7f0000000480)=0x8) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f00000002c0)={0x3, 0x4, 0x6, 0x7}, 0x6) r3 = dup2(r0, r0) getsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000000)=0x4, &(0x7f0000000200)=0x1) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x0) getsockname$netrom(r0, &(0x7f0000000040)={{}, [@rose, @rose, @default, @bcast, @default, @remote, @bcast, @default]}, &(0x7f0000000100)=0x48) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f0000000240)={0x100000000, 0xff, 0x2, 0x5, 0x16, 0x0, 0x8, 0x4f, 0xfffffffffffffffb, 0x2, 0x1, 0x3}) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r3, 0xc0505510, &(0x7f0000000540)={0x85da, 0x2, 0x6, 0x10000, &(0x7f00000004c0)=[{}, {}]}) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) 20:41:07 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x0, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:07 executing program 5: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x83) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000000)=0x1) syncfs(r0) fsetxattr$security_selinux(r0, &(0x7f00000001c0)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:initrc_var_run_t:s0\x00', 0x26, 0x2) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa004000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x300, 0x70bd26, 0x25dfdbfb, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000890}, 0x24044040) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000240)={0xf, {0x6, 0x8, 0x94b4, 0x1}}) setxattr$security_smack_entry(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 20:41:07 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0xfffffff6) [ 306.395948][T15195] EXT4-fs (sda1): Unrecognized mount option "debug_want_ [ 306.395948][T15195] xtra_isize=0x0000000000000000" or missing value 20:41:07 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf83f0000000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:07 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0xfffffffe) [ 306.573576][T15206] EXT4-fs (sda1): Unrecognized mount option "debug_want_ [ 306.573576][T15206] xtra_isize=0x0000000000000000" or missing value 20:41:07 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0x0, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:07 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x0, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:07 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_%xtra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:07 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:07 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x10000000000) 20:41:07 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0x0, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 306.894470][T15225] EXT4-fs (sda1): Unrecognized mount option "debug_want_%xtra_isize=0x0000000000000000" or missing value [ 307.011262][T15232] EXT4-fs (sda1): Unrecognized mount option "debug_want_%xtra_isize=0x0000000000000000" or missing value 20:41:07 executing program 1: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x800, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x0) getsockname$netrom(r0, &(0x7f0000000040)={{}, [@rose, @rose, @default, @bcast, @default, @remote, @bcast, @default]}, &(0x7f0000000100)=0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) 20:41:07 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x800000000000000, 0x7, 0x942, 0x0, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:07 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:07 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x40000000000000) 20:41:07 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:07 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_pxtra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:07 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:07 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x80000000000000) 20:41:07 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) [ 307.260593][T15247] EXT4-fs (sda1): Unrecognized mount option "debug_want_pxtra_isize=0x0000000000000000" or missing value 20:41:08 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x800000000000000, 0x7, 0x942, 0x0, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:08 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x100000000000000) 20:41:08 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) [ 307.422719][T15257] EXT4-fs (sda1): Unrecognized mount option "debug_want_pxtra_isize=0x0000000000000000" or missing value 20:41:08 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0xe798, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x101}) ioctl$SIOCGSTAMP(r2, 0x8906, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shutdown(r2, 0xfffffffffffffffe) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000340)="01cb757dd4e03cf6b8ae9b3148d99163bf2206e037bb8d44ad6739f6b571b12770201a59d43c022e9f15a0ee6912f792941ab2319946692288104aa5dda9623119e1b95e32eaa858dc7fabd35bfc64d5ebe007bbc760eaf89b0cc09ac949f18fe8f5a1dcaf93eb574f90bb9f81c1b2633f9078ad126ae661bd85cab44b42a2", 0x7f, 0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000003c0)) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, 0x0) sendto$packet(r4, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/exec\x00', 0x2, 0x0) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f0000000280)) getsockname$netrom(r0, &(0x7f0000000200)={{}, [@rose, @rose, @default, @bcast, @default, @remote, @bcast, @default]}, &(0x7f0000000100)=0x376) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$UI_DEV_CREATE(r6, 0x5501) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x20032600) socket$unix(0x1, 0x2, 0x0) openat$cgroup_ro(r5, 0x0, 0x7a0f, 0x1700) 20:41:08 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:08 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_ex\nra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:08 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:08 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x166020000000000) 20:41:08 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x800000000000000, 0x7, 0x942, 0x0, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:08 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:08 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x200000000000000) 20:41:08 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x800000000000000, 0x7, 0x0, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:08 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) [ 307.950538][T15272] EXT4-fs (sda1): Unrecognized mount option "debug_want_ex [ 307.950538][T15272] ra_isize=0x0000000000000000" or missing value [ 307.975991][T15282] device lo entered promiscuous mode 20:41:08 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x400000000000000) 20:41:08 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) [ 308.141340][T15293] device lo left promiscuous mode [ 308.178202][T15294] EXT4-fs (sda1): Unrecognized mount option "debug_want_ex [ 308.178202][T15294] ra_isize=0x0000000000000000" or missing value [ 308.695481][T15293] device lo entered promiscuous mode 20:41:09 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x0) getsockname$netrom(r0, &(0x7f0000000040)={{}, [@rose, @rose, @default, @bcast, @default, @remote, @bcast, @default]}, &(0x7f0000000100)=0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x3ff, 0xf07, 0x4, 0x6}) fcntl$getownex(r2, 0x10, &(0x7f0000000240)) syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x2, 0x2) 20:41:09 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:09 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x800000000000000, 0x7, 0x0, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:09 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:09 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_ex%ra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:09 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x600000000000000) 20:41:09 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x700000000000000) 20:41:09 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x800000000000000, 0x7, 0x0, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:09 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) [ 309.030562][T15311] EXT4-fs (sda1): Unrecognized mount option "debug_want_ex%ra_isize=0x0000000000000000" or missing value 20:41:09 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:09 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_MCE_KILL_GET(0x22) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x5, 0x0) getsockname$netrom(r0, &(0x7f0000000040)={{}, [@rose, @rose, @default, @bcast, @default, @remote, @bcast, @default]}, &(0x7f0000000100)=0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000200), &(0x7f0000000280)=0x68) 20:41:09 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1f00000000000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:09 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x800000000000000, 0x0, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:09 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0xc00000000000000) 20:41:09 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_ext\na_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:09 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:10 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x0) getsockname$netrom(r0, &(0x7f0000000040)={{}, [@rose, @rose, @default, @bcast, @default, @remote, @bcast, @default]}, &(0x7f0000000100)=0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x200, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000000)) 20:41:10 executing program 5: mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:10 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0xd00000000000000) 20:41:10 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x800000000000000, 0x0, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:10 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x230f000000000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:10 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x1200000000000000) 20:41:10 executing program 5: mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:10 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_ext%a_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:10 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x0) getsockname$netrom(r0, &(0x7f0000000040)={{}, [@rose, @rose, @default, @bcast, @default, @remote, @bcast, @default]}, &(0x7f0000000100)=0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000000)) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) 20:41:10 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x800000000000000, 0x0, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:10 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2d00000000000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:10 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x3f00000000000000) 20:41:10 executing program 5: mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:10 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x0, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:10 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3b00000000000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:10 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x8bffffff00000000) 20:41:10 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x8cffffff00000000) 20:41:10 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extr\n_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:10 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:10 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x0, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:10 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x0) getsockname$netrom(r0, &(0x7f0000000040)={{}, [@rose, @rose, @default, @bcast, @default, @remote, @bcast, @default]}, &(0x7f0000000100)=0x48) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000000)={0x0, 0xefa}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xf7a}, 0x8) r3 = openat$cgroup_ro(r1, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) personality(0x610000f) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) 20:41:10 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:10 executing program 5: creat(0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:10 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0xe4ffffff00000000) 20:41:10 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:10 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x0, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:10 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x0) getsockname$netrom(r0, &(0x7f0000000040)={{}, [@rose, @rose, @default, @bcast, @default, @remote, @bcast, @default]}, &(0x7f0000000100)=0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) timerfd_create(0xf, 0x80000) 20:41:10 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0xf6ffffff00000000) 20:41:10 executing program 5: creat(0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:10 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extr%_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:10 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:11 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0xfeffffff00000000) 20:41:11 executing program 5: creat(0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:11 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x0, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:11 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:11 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0xff01000000000000) 20:41:11 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, 0x0, 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:11 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:11 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x0, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:11 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extrp_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:11 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0xff0f000000000000) 20:41:11 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x0) getsockname$netrom(r0, &(0x7f0000000040)={{}, [@rose, @rose, @default, @bcast, @default, @remote, @bcast, @default]}, &(0x7f0000000100)=0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x11f) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) 20:41:11 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:11 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, 0x0, 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:11 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:11 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0xffffff7f00000000) 20:41:11 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x40800, 0x0) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000000300)=0xc0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, r0, 0x0, 0xf, &(0x7f0000000000)='trustedtrusted\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x9, 0x3, 0x6, 0x0, 0x9, 0x91910, 0x0, 0x100000000, 0xe6, 0x2, 0x7ff, 0x2, 0x81, 0x1, 0x6700000000000000, 0x8, 0x80000000, 0x3, 0x3ff, 0x73, 0x0, 0x7, 0xffffffff, 0x0, 0x7, 0x7fffffff, 0x2, 0x4, 0x7, 0x590, 0x3, 0x5, 0x9, 0x9, 0x9f, 0x0, 0x5, 0x4, @perf_config_ext={0x80, 0x29e}, 0x40, 0x10001, 0x8, 0x1, 0x8, 0xffffffff, 0x9}, r3, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x0) getsockname$netrom(r0, &(0x7f0000000040)={{}, [@rose, @rose, @default, @bcast, @default, @remote, @bcast, @default]}, &(0x7f0000000100)=0x48) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) 20:41:11 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extrapisize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:11 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x0, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:11 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, 0x0, 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:11 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0xffffffff00000000) 20:41:11 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:11 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 311.226595][T15483] EXT4-fs: 11 callbacks suppressed [ 311.226611][T15483] EXT4-fs (sda1): Unrecognized mount option "debug_want_extrapisize=0x0000000000000000" or missing value 20:41:12 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xc000000000000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:12 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:12 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x4000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000400)) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0x170, r1, 0xa08, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@loopback}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xfff}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7fff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1000}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x81}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x401}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x10}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_team\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x6c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syz_tun\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}]}]}, 0x170}, 0x1, 0x0, 0x0, 0x4001}, 0x4) creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) [ 311.383175][T15497] EXT4-fs (sda1): Unrecognized mount option "debug_want_extrapisize=0x0000000000000000" or missing value 20:41:12 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_\nsize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:12 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf5ffffff00000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) [ 311.628785][T15510] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ [ 311.628785][T15510] size=0x0000000000000000" or missing value [ 311.753940][T15512] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ [ 311.753940][T15512] size=0x0000000000000000" or missing value 20:41:12 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) getsockname$netrom(r0, &(0x7f0000000200)={{}, [@rose, @rose, @default, @bcast, @default, @remote, @bcast, @default]}, &(0x7f0000000100)=0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) 20:41:12 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x0, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:12 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:12 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x2) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:12 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:12 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_%size'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:12 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf8f73f0000000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:12 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x0, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:12 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:12 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f00000003c0)) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='trusted.overlay.nlink\x00', &(0x7f0000000340)={'U-', 0x82b7}, 0x28, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4) ioctl$SIOCAX25GETINFO(r0, 0x89ed, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000400), &(0x7f0000000440)=0x4) getsockname$unix(r0, &(0x7f00000000c0), &(0x7f00000002c0)=0xfffffffffffffd15) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)) [ 311.999395][T15524] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_%size=0x0000000000000000" or missing value 20:41:12 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfcfdffff00000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:12 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_psize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:13 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x0) getsockname$netrom(r0, &(0x7f0000000040)={{}, [@rose, @rose, @default, @bcast, @default, @remote, @bcast, @default]}, &(0x7f0000000100)=0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_int(r1, &(0x7f0000000200)='cpuset.mems\x00', 0x2, 0x0) connect$tipc(r2, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x3, {0x0, 0x4, 0x2}}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) 20:41:13 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x25, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:13 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000000040)={0xc08d, 0x0, 0x1017, 0x6, 0xffffffffffff0c07, 0x3ff, 0x3f}) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:13 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:13 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x0, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 312.351853][T15545] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_psize=0x0000000000000000" or missing value 20:41:13 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:13 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_DUMPABLE(0x4, 0x100000000000002) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffff9c, 0x29, 0x40, &(0x7f0000000040)={'mangle\x00'}, &(0x7f00000000c0)=0x54) connect$pppoe(r0, &(0x7f0000000100)={0x18, 0x0, {0x1, @random="5ea700f7d700", 'vcan0\x00'}}, 0x1e) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000000)=0x6) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:13 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x25, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) [ 312.492488][T15559] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_psize=0x0000000000000000" or missing value 20:41:13 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:13 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(r1) setsockopt$ax25_int(r2, 0x101, 0x2, &(0x7f0000000340)=0x1, 0x4) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) setsockopt$inet_group_source_req(r2, 0x0, 0x2e, &(0x7f0000000200)={0x100000000, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e21, @broadcast}}}, 0xfffffffffffffe88) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mcmUry.events\x00<\x02\x86dW\x13k\x87\x15r\xc5\xd5\'\xa6\xb8\xa9\xca\xe4\xc1\xf5$X\xda\xe7\xe3>\xb9\xac\xa1\xf7\xa7-k#t\xa9\xaf\xecU\xf1&\xb4~\xaa\x0eLog\x93\x9f\x9e\xa9E\bb\x1di\xf6\xcb]v\xb3\x10\xdf\xb45FlFd\xc7/\n\xf4\x04M\xfeEc\xe8L\xc2\x87 \x00\x00\x00\xf8\xff\xff\xff\xff\xff\xff\xff\xea\x83\xbc\x14R\x82\x9f\xa1\xa0\xa1\xd2M\xed\x85XS\xcb\x81\\', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x0) getsockname$netrom(r0, &(0x7f0000000040)={{}, [@rose, @rose, @default, @bcast, @default, @remote, @bcast, @default]}, &(0x7f0000000100)=0x48) ioctl$VIDIOC_QUERY_EXT_CTRL(r3, 0xc0e85667, &(0x7f0000000440)={0x80000000, 0x1, "fa458fc56fdfe56703531db5504e3c51ea58219983b5dd08d20cd26158d058f4", 0x6, 0x2, 0xd98, 0x9984, 0x400000000000000, 0x1, 0xff, 0x9, [0x3, 0x7fffffff, 0x6, 0x1f]}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_type(r4, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) 20:41:13 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_i\nize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:13 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:13 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x143000, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000040)={0xfd, 0x0, [0x8000, 0x100000001, 0x9, 0xff]}) getpeername$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20001}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="000000df250000ca970a7bd147fe0471fc7d", @ANYRES32=r1, @ANYBLOB="06000000"], 0x1c}, 0x1, 0x0, 0x0, 0x20040000}, 0x10) creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:13 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:13 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x25, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) [ 312.751400][T15576] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i [ 312.751400][T15576] ize=0x0000000000000000" or missing value 20:41:13 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:13 executing program 4: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x4f) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x7ffb) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:13 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100), 0x4) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000012c0)={0xc8, 0x5, 0x3, 0x49cf, 0x1, [{0x3, 0x8, 0xffffffffffffffff, 0x0, 0x0, 0xf8e}]}) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x0) getsockname$netrom(r2, &(0x7f0000000040)={{}, [@rose, @rose, @default, @bcast, @default, @remote, @bcast, @default]}, &(0x7f0000000200)=0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) llistxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/4096, 0x1000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) 20:41:13 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2000000001, 0x0, &(0x7f00000000c0)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:13 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) [ 312.971535][T15595] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i [ 312.971535][T15595] ize=0x0000000000000000" or missing value 20:41:13 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:13 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_i#ize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:13 executing program 1: r0 = getpgrp(0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x0) getsockname$netrom(r1, &(0x7f0000000040)={{}, [@rose, @rose, @default, @bcast, @default, @remote, @bcast, @default]}, &(0x7f0000000100)=0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) write$FUSE_NOTIFY_INVAL_INODE(r4, &(0x7f0000000200)={0x28, 0x2, 0x0, {0x4, 0x4, 0x401}}, 0x28) ioctl$SIOCAX25DELFWD(r4, 0x89eb, &(0x7f0000000000)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) 20:41:13 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000540)={{{@in=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f0000000640)=0xe8) bind$bt_hci(r0, &(0x7f0000000680)={0x1f, r1}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000340)=[&(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='veth1\x00', &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000280)='veth1\x00', &(0x7f00000002c0)='veth1\x00', &(0x7f0000000300)='veth1\x00'], &(0x7f00000004c0)=[&(0x7f0000000380)='security.selinux\x00', &(0x7f00000003c0)='veth1\x00', &(0x7f0000000400)='veth1\x00', &(0x7f0000000440)='veth1\x00', &(0x7f0000000480)='veth1\x00']) bind$inet(r0, &(0x7f0000000500)={0x2, 0x4e22, @local}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000000)={'veth1\x00', @random="34fa3dade260"}) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:13 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'d%bug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:13 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x0, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:13 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) [ 313.259829][T15616] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i#ize=0x0000000000000000" or missing value 20:41:14 executing program 4: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bind$llc(r0, &(0x7f0000000080)={0x1a, 0x1b, 0x76f8, 0xe8, 0xff, 0x40, @local}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:14 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x80400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:14 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_i%ize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:14 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x0, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:14 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:14 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'de%ug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:14 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mknodat(r0, &(0x7f0000000000)='./file0\x00', 0xc000, 0xfffffffc) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:14 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) ptrace$cont(0x9, r0, 0xfffffffffffffffc, 0x100) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x0) getsockname$netrom(0xffffffffffffffff, &(0x7f0000000040)={{}, [@rose, @rose, @default, @bcast, @default, @remote, @bcast, @default]}, &(0x7f0000000100)=0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) 20:41:14 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x0, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:14 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) 20:41:14 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_i*ize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:14 executing program 4: readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=""/158, 0x9e) creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:14 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'deb#g_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:14 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x0, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:14 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_i+ize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:14 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f00000000c0)={0x1, 0xcb}) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000000)="22b8f293218bdbc53fb99b0bead5963e08", 0x11) timer_create(0x2, &(0x7f0000000040)={0x0, 0x1b, 0x0, @thr={&(0x7f0000000280)="413315eed18773adee24a3c3c00582ba9acc01024dff608bd5b3d2b142356801cd93d71935e1a711f2ac725a228b0f3aa4c1c9878ed5a8ff871bd46a9893e5480bb8a94205a408b89af170fea83a39b664bf846856ba2eefa5e5ff387d8029e9e40960255b13ea9a1657ac9987e17fa1e6668b623d418e86fe2dfe779fb30c3e02c35622c24f7c6f7ce98bae6d165a0ef61eca3c27cde414844368d30dc6e49dad96ce49cda34b772ac4400a46e426299da58592a0e8c9e489e483bbb8631bad5c577462c6f22de22a1eee27701fbcef1896f5", &(0x7f0000000380)="cb67d74db610c98c3dbe6876bbc62e936b38068ff677447a2eb6c5ef47be0464f4e628e07adb6cecf62c3f1099bd2a6a9d429da10292dfd6bd4d6d2a5fb8d408bc50f943ae46d1a2239718ecf88c222390606a24812b9e4d1442afaddfe3cd06b25e4be35f30cfc6d5483c4562f1cee5e320f889ef4deaf9666c109f84ab93cd33c4f55fee683f8552bdb900377a81bc2513703d07ae38d38e97e08e30e5b951015fdeb8f607801d99a5bb882d03b9b8987e1c25c466d61802f80d8c13f93eed489cce469688"}}, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x40) prctl$PR_SET_NAME(0xf, &(0x7f0000000100)='trusted(\x00') 20:41:14 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_i%ize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:14 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000200)=""/21) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x20000000400200) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f00000001c0)=0x9, 0x4) getsockopt$inet6_buf(r1, 0x29, 0x6, 0x0, &(0x7f0000000080)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x5, &(0x7f0000000280)=[{0x7f, 0x3ff, 0x3f, 0x40}, {0x5, 0x800, 0x9, 0x4}, {0x40, 0x100000000, 0x80, 0x9}, {0xfc, 0x81, 0x9, 0xf8}, {0x7, 0x4, 0x0, 0x9}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000000)={{{@in=@local}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) 20:41:14 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'deb%g_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:14 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) getsockname$netrom(r0, &(0x7f0000000040)={{}, [@rose, @rose, @default, @bcast, @default, @remote, @bcast, @default]}, &(0x7f0000000100)=0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000240)={0x244, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}]}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xffffffffffff08f5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffffffffff01}]}, @TIPC_NLA_NODE={0x3c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x81}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x74, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1ff}]}, @TIPC_NLA_LINK={0x34, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x80000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1f9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100}]}, @TIPC_NLA_LINK={0xa0, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}]}]}, 0x244}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000640)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000680)=0x24) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000540)={0x0, 0x2d4ee80d}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000005c0)={r3, 0x80000000, 0x66, "f61bc23cf1dd5ddefd6200d89f9ee0b3916276ec05406a3b35eb9ead24d0041943048d7e66ffc6e2417df64e9d05a77f94d6784497606aa73438e250321d930c4300df548938d2e8182027b853cabb8ca8d7f259b6a8c4278f9ab1966c13b41d518f92df3071"}, 0x6e) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) 20:41:15 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x0, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:15 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x0, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:15 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f0000000000)={0xfaa8, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x8, 0xb2c, 0xffffffff, 0x6, 0x4, 0x9}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:15 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_i-ize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:15 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$l2tp(0x18, 0x1, 0x1) bind$ax25(r0, &(0x7f0000000000)={{0x3, @bcast, 0x8}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @bcast]}, 0x48) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001580)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000001680)=0xe8) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffe, 0x7, &(0x7f00000014c0)=[{&(0x7f0000000100)="4042cbc5baa8", 0x6, 0x17}, {&(0x7f0000000280)="3c7d7b99fce347b9e3c1df518ba53edfe2a612a686bc9e7f4fe5c0bab8d9a7d41e71b3265f67bf4e6a3a1b139c8440223c267fe870516d9737a6f4d29e2794e700c249a6a53eb4b1ca008f868f51c078aaece8f5048d4ba973f5a56480108d95588a3a1c043e5e232cf189f42da640095b4d8139d3ffde625ef057746596def551925958d9814724a80b43b11f476e8d97f8e3840a0a9a756c79bfaed86c81e2df68d89483c975dea1bc82afa9893e7b56612771ae356262e6d10b9a427ca785c41431b17ff1b5144ea2fa255bf6a95dd3564f941331e9e822fcfee777cf", 0xde, 0x7a1}, {&(0x7f0000000200)="0e4eb394b4690279b805ced1df2c45df10fad53538d96837c7213af8f6017d61a52c2d44f04d40cea8dd741ea372cafb298c412d8d2f2d", 0x37}, {&(0x7f0000000380)="4470df5d5de5b82871596ec8a9a4c1cb7b46e0946f62b474275611cd6f552937accbb62c853f6f9d2dc5ec295fa4907d", 0x30, 0xfea}, {&(0x7f00000003c0)="b4cd1f01e2f56785a5c9fb509ccce39b22922d798cb76b5b156f1f0ddfc4a9992c26ddbea470b9ef5a40c8f9830a64808fc1dc465cb8dc7b290a9efa54782bbfc70e2811ae199c34a818556000d714f0bd5b7e367c8ac825f848265dd30eceae2209", 0x62, 0x1}, {&(0x7f0000000440)="f4f333652b16470401ba6c82762ff6959dc1674a3f8cfda8b27b4bbc97b04885f00a388ae895e5a040c3a4f3ad769ac66e4d8544c7fc3519147f88ae45e326b6dd63737e182aabbea0f3338993fa485a4b1d3f154d08865c627521d243c599324b1a", 0x62, 0xbda}, {&(0x7f00000004c0)="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", 0x1000, 0xfffffffffffffff9}], 0x80, &(0x7f00000016c0)={[{@nodiscard='nodiscard'}, {@discard_size={'discard', 0x3d, 0x9}}, {@quota='quota'}, {@uid={'uid', 0x3d, r3}}, {@errors_remount='errors=remount-ro'}, {@umask={'umask', 0x3d, 0x7}}, {@discard='discard'}, {@resize_size={'resize', 0x3d, 0x401}}, {@umask={'umask', 0x3d, 0x1f}}], [{@subj_type={'subj_type', 0x3d, ')user*'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:15 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x0, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:15 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'deb*g_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) [ 314.746477][T15718] JFS: discard option not supported on device 20:41:15 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x0, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:15 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0x0, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:15 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_i.ize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:15 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000), 0x4) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000280)="67620c8476b30362f49cbac5d3c863b7098a03e24bede0db334529539c6b88e8d09346558eb46c2fc98f7d1165d5ff8baea8a872a871b09074bcd8e5ed1000e794a62dbf660b69932bc861eac78765ce957f7898af4422b3134fc25f6c17fd821bef5684418509bac23f1c09a0a80e4e65f45791903c86a42806a2f607999d4de69320cf1b32d84a2130f6c62d8aec124b5bfb23b4c077e1200104064a2f481d079df0d04bb48bfc0203cdf50717169d004ec465b0fefa3ddd44135515d7566e4019818961e0fbcc4e665ffdc799de6d9f34d490e38f57d1f3720b3cb918a8c154617530df5bda86b9121ee5f5c94b6b0c31009659dd848a1a52bf908cd0e3c419b9999688c0e86c19d328accf2fcc7df34063159c2146f164cb2b3f43a42d071cb05087e641b92da555c71d7386bb8939154235f02b63d72abc0f7f7d994211a2b1f03f6821d79f2aee5bc2a0b51952a54384a0ae082d6b1f346a7482e1451bf41f09c31fa923f1f4ba4a2d3866a5e73ae1c32e5c4ee5fdddb468d7d0591c4e94cb4f211e324c1876f085b834c8adcda4fcc74827b13cd5eab4b6d94af96c9549a61dfd56bef6d3145b6214bc179409b6c808d0cbdf652a9d09025b35360333fb1c8d2bbd1af699e947cf1a169ba145f96890515f444bb874deca9bb4766aa64ec835d02b68f96e3f11c6947e759ed86b8cbe292594b7655061786341b81fb5960de12075d95981ca94c0888668c21680f16d09dcda5cffee8f4c3344195ccd16b713b0aa23438f16dd97d5f8c86448b75de95c51d53c0aa973ff75d86dbe185ca251694115f15eef1980d7324458daab8aa7031986210b8e0592ab4ebedb80b5b1c7fb54b26b2207d9f93d3ce6984ea5f70155b1ff8556361d0de798c04f757a813651e2c97eaf8c5ac6ceacd0e5caf73d3ef892cfc2c1d44ed573c834af4274d2bb2d549044679e4b9e7d60b0c70215c13fcd4178720a23d6bace2bb999aff80d4c4a55d4992769ba13a3044384692752ae1d6843be1ea08c3ed7b3b4e888d91938ab83378f6de96ba5f826a089b5024aebea90a249196f431710c3c792a5755c5c0addb190ba681d57807a57561f035b72921e6f1736c6deead560dcd70330027bcee9d8a7aa664e8c13cc2286fb01ea48f63f02f53602211950eea18ab8a92c8dc8b72c5cf51dc759f43e23d8cb495d39aa46c69f0bb1aea90da716087293442130c302f23adeb7b162da1a3bcec019c6641c9ba3d0ee32183de26aedb5fff67ee8976b2d2aacfe3a816d544a888abdb6277c46a1a86b9cda4467efe1877ce77ca6196a6fedaf30117528e2875485f973693682fb639c08bf215fa5cbbb211e855e77646a66c56d04f234d1a1d490bb3ba9993bd177dcd191e4fc209219357773cd50b55c340f254472a061828c84a0625f5cbf0d79219f44f0f19235d25c1f4742a987765d75d158d32757d0496e7e2c27ea43db2dc46b788cb67e8b513c918630ac1509007e96f801710122d06cc053db1335911b8930ea418a37c9d5c337bb735f39703547c8b698c68c79f5446856b35c6f92ac57952a9aad5dd96fd82b7dae849f486aa0713730756a2c8964004dfe0a1f02e1c92aeaf67c37e85285d4c971875f2ab9ad8508110646b3a412e952d0bdd375d69dab7313ee2c6ca62bdc26f83c6da490c2ec730c88c0c98c1224eb962d3a76fdf342db603403623d064df4c71ca1a4033c9546fc07f7f471b32374365efcbba184d3549db384461c55c70d1e7217eb5dd1a2a03eb4e2eb8956736f069c13763183e4980da64fa3f75f40cdb6f0a127abc5bf1da5a0b8944a939bec88bb1b9299342fa0848dc107c856bbc882fb836a44e7d70e7dd03be7b2a3eaafef746a33aa8dbc6eacb5598afbe9a46cd612a2a27b872f2810e113edcb1faf224c16a852e0785ed9795f5832ef51a0733464ed29fbc9ae16a5f2037cdcca4bbd9b1e9bd60e488b47970c4c6d5c8be0ce36d6b2ca682f563eb7180332ea3ccdcb08747d962cdbc7d6f6b290ff5cd1a0b209fd19c8929df6a0b236c7f8b60364876dbedc79553f6cf91b2291335cd13454ae991f7554b4a5a5b67a70d12356cdb11063bf71923555d32966f5adf367320c0ba18b26679fbf54c2f1fd0cd1d90cee896413bf57faabe6072e966a6771d31a89710c012662955ac1ef2ea429f0d2a90339ec04c3b484e17c4a6b74b66918fa63ed258257063822d5552e959884916461beccfa461579bb0b9d63551c2a17b800a4d19f42cfd12e0e0d38e60f9b4c04c996201cc31acc1f19a317e54aeb66f2cbd38c06c7b1d13201d130a2a06d7ec85d773f1bee66423bcd237d54b96e517c69b0289c54a4418cb8992e1cd91ddfbbe16c68ce54981997c8efe2d9f622f8412a41e5b2ddf591609c822b8644c527530e798fc62028c8914d0f0f36d1e180130b0c07461ac7769c6e854e1a975d1e325ece9b003f7f9f9b22ed63c257f71f3e39708d791f183d66d96f199abfddb903cadf1761c41213d242ef5ea438ae00042bf709a482436db76fc8f8237d8b5c6a47c4e709f4683df58fc4526baa76e49ac5a4deef4159fb80e9743fdc28dade4f5860a8c6062a5bd5d6599c4aeb5f92b0d778a92acce9b6b870ed89edac909a1e55131a02232768dfd55eb12f454f6803f46abdcbe1833871c0d2376179e5d8efade766263af75255bfc2d9f8f95b3600c3e1e18303c575c00c080b30f8a31d40f1d4e4d2291113ed41122329067d89b6ce840ee35583c02a79dbddaef9a5454457d394c52b3cce0bc0f5b51ad8e5385bb8fca28b8fce3f6d83508cec011d9e1c31a6e3168fa50e0ea8bbf2aba6782b55091199033096bd57b425204eff25c228b3b606ba55e7ef34186a6f766b608fc301e3a8aaffbbb3c5090ae814a89c356dc307705ee3ee3c88da00fb55f4b1df0b04673a3cbe990ef470ff9675c27728f5fd85167125972c24e7de2133445ae6e9f1e4861066c57e1ec7d3666e24f74d1c14eb38012477d0bee70757f05e7fab239061144064b88229ce0402db1f17f96c3ce16f80806665b4bb2b46eecb92e03cddd369bd2d731927abee57717d8bc098bf90dc28997d81805e705e285a105b1de4c27427a1fb4021fb7af933c55382524ceea1d2fe21a3dacd90c1279960971017e3d95c77fd6ecfddf098558856ad96d3f71791f1d20a0c9001a5455b529908cd594337bbd031c7a7d7d8ccc885340dc171dfed9c4a2d864796ff1670f766ed699869e4afe7488cb744f0b33c93b49e3c91aac8d3c84c00d51941b9f529af407acb4e8a265a8aab0e291a93b212e33ed9a06879bb5e3530e2d3c1ee6de1b661658aff368963fd06940179e010fd5eb0c909464b237a98c10e25789e1c25fc79131d8fba44922f3f86df2ad47cbbeaf3e8786a09a9a2ad11ee2170ad5204b1bf111ad1b0da7ce74e28fb086ec8a9e2399c869a6fe88849ef80473843d00f3b971168bba8124f36f26ee75d0ab8f42fb131ffc5974e09da167fada93f822d5676bd0aba8355369263ac05f23b0d724f45f77e0a1453c9522e91b7e991b1bf577177b57b1b57679216159c319ee978938addb12c6c49cebe73dacb01df49523b0292cf5534715d75a6622444f8bbb53bbec0fe5e95207df308816c5fc89875ef6c9adf1c3a961235d051610642d69445e1e75de1dd2f3568336600d4c10cde68ec4f72a3980f79b5e9560221c014300969186c44551e799716700378e4419fc15f9471b34606d640a1cbf639203b5192c080847c72a9811b094081351e865cc6ee5a22b429a3b7971d10849632257afaaf45278cf64806a0cf2d492e4cc9af93d41d2396013567a710c3e6b55d3b1e2b4f824969df20e20d1df9c6d7bc8a6418bf12463f2a4fd132a81a8289c9577b9992582c8a3be9bbeb4e8ff3f3bdcdeeae2d19603b37876df0fd1ce928661c7157160153de1598d8e8f08773c48cae4596784d51d9cd6889efbaedd3fec632cca488f133a2535614374237244cde5853c653a2995ad6928f4cd1f819c2e81f450bc264b2700e0ca11ec6d1f6a76195709d123b2a959cae61fd100b3fcc9d4640eb295d2e6040e33dfffc80551892b87a1d73028150f33d66054e5b61b7b478f53dfef03e39860e53d715bb0caf2f49eb920d8bce0fa2cd332d29335b15e731699aa08ec29b7087d8e879f1d2730414dcdb6039445e1659450d34d0a62a3e4a27605cdd646eba7bcd28b5363c85d18237983f6d1104ae72502294fd239b5477745700377d50e9cdfce220c98a30dbcd093aaaad29dd65b7d109134a9862bc67b0274ab3b4d024bfd05c7145552df9765708697fbcfcf065cecb56d8e47d7c81ddf6c87712e827d7429f6f68961381f488436292acb6f88ae978e447295f5950a899bed1acadad9fe4bede88e1ab74a777b78377dfcdc7759fb83362039490da28fb7ac46797df6a6cd4d7db0c1e16ef82437df9b363d29d58e46221c54ed448f339dd7161177171306e87bbbb2a4f296761d8dd0c78d09943232877c14f86c38fcc796b6cac3fd83667942a071c21c59955ea12325babea3dc23f7b139287341d45f3cc7e9a7d8ff15c7d38488b6bde0c87f5ce91aa7491bc6ff4ab705cc02315f818c4e984ad2f8d5a6316324221b03e63b223eca6f3a0641af2a560bd5555c7b87fd2391f256c58a0375c78e42b6bfa84456d4ab6058b66e12057fab36818a2a78bb2e99c1cd373ecc51cafa108e1999d080eb73c37f80aebbaf2f15f6afd8e1b9b8e1de7a0b3753707d73be62c47ffd5b31f0de3351a90e2dbc7b048c7e5ff8eb8d655f566a05d903fa7268f43d571a148cb9d35ff685a27c1abdad350e2940a34b19b07bae6d59b1b866da3a6280f47db77cb37a900bd0167a07ea34995352ac58a4e1b8571b70af51f1e23e4f760a107a401095aa0d54673d3f7a56361b1c3b31973723fe8ea3a429594a64a02529148751c72d7e3943fb7dfeffd04601b0a77340718b8c868d12a015b9fa6abb52383e7d38c51e15db78dbe2b1a748a4adef275be5d2ecc89dd0cc41865d1323127f1c4314f796b798c70de87b72f53cc5761a9dc0531d3b41c175cdccc36a0b0e2149cb7970e6cf507eae9b804197d389ad5855ea00934db2bb54522cd2d733739c9c46c829e71bc89829f39f74ddd6f4a8967ef31a30677012731f4a9bf1fee680e75d3465a356cb4682424a31121cb39195bb4c50c4208ca8f58be5cc7d925f69ce0689391a35eb9e244e5c7f44ec2cd18872579d68ebf9b89494bf24bc14cb8a2a5581690252aeb6df9b4aefd0df2db666f3ce074c674ac2280f10e94e5a52fbc677d451097cd4c5b07e369ee3e3b3002aa8c8ee308521bfb72093f266bc2f3e884add8b1fcec9048ec50e16335772f8ef09312648749f1e194db4cdf0de035f125d16a486b8ec9591f57a09aef7825f3705faedf6ac7f7c5b96af2963cdac125f2535096ee43a9c787b99cf04b98c8a6fe2065c79cc6591d1d2bd9b457e0ebbdc22c52416e4fcdd116027823f52bb70b03e491eef611f4e5fa8465634861b4b8d31df5bc09e7985822e45dc161c6791bf711ef19cd2131d118c52d84aabed448d197ecbe172dc2bc81b8285955f5c185bac8084607db66911e2b120ff42475ec256b5a9467719a633a9213d84a4f058ff89abeb7eeb569929389f7846faf3ba703a43c48ceee3658fd5342f128efdae0586e372ce532e8d2c9ab8a92fd8517a7cee1368ea10ab9bc791653d55c96887e369f32496807e1af671035d8c4", 0x1000}], 0x1, 0x0) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:15 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$adsp(&(0x7f00000004c0)='/dev/adsp#\x00', 0x9, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000500)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000000540)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000580)={r3, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x21}}}, 0x6, 0x4}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x0) getsockname$netrom(r0, &(0x7f0000000200)={{}, [@rose, @rose, @default, @bcast, @default, @remote, @bcast, @default]}, &(0x7f0000000100)=0xfc1c) write$P9_ROPEN(r4, &(0x7f0000000000)={0x18, 0x71, 0x1, {{0x8, 0x3, 0x6}, 0x3}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280)={0xffffffffffffffff}, 0x117, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r4, &(0x7f0000000300)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r5, r4}}, 0x18) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$RNDADDENTROPY(r6, 0x40085203, &(0x7f0000000040)=ANY=[@ANYBLOB="ff00000033eaffff1476a98845e7c5c29d5b555cb726ecfb4ed0d400000dc73f0a9852c11352239500feffffffffffffd6eaa30d28a1e5dc6d8c8f"]) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x20032600) r7 = inotify_add_watch(r6, &(0x7f0000000480)='./file0\x00', 0x64000002) ioctl$VIDIOC_ENCODER_CMD(r6, 0xc028564d, &(0x7f0000000640)={0x3, 0x1, [0x5, 0x3, 0x3, 0x14ca, 0x3, 0x5ca0, 0x4, 0x4]}) inotify_rm_watch(r4, r7) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x8000, 0x0) recvfrom$ax25(r8, &(0x7f0000000380)=""/72, 0x48, 0x2000, &(0x7f0000000400)={{0x3, @bcast, 0x2}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @null, @default]}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a0f, 0x1700) 20:41:15 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x0, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:15 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="00fb0a0007c09a10e2379273aa7fd6b5b66e53b1462d0a0c19febf6eaa22275f48a56e1cb0798b72472454531749379f63ff36d3607c525dfd688382d26db2b4b830a0c25d94d84fc97026fff535ee1afd7143db16d28f935aa771a1219942e308df4e029b918ebe86f13c677903905d05cb1679ef7e3eaddddc570e600b6898cb58e45132c7b25d7a623ef5f323a31e8db7649a194fa8c8965bc8b07e51987d8f16591a1c171f8cbb48ecffda8b9f152db891a0d954cb9e9ecd47b8c54e3d9303086b61142115382dd64d3058735474db63150e43cb9f3dee106f6eb428e7f03db6e7ce2353c08dfbcb0fecdf5a00"/250], 0x10a, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:15 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'deb+g_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:15 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0x0, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:15 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0x0, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:15 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getuid() syz_mount_image$ext4(&(0x7f0000000300)='ext3\x00', &(0x7f0000000340)='./file0\x00', 0x7f, 0x2, &(0x7f0000000400)=[{&(0x7f0000000380)="c895041f0ddde607645b9a7df2064740924cb83ca25f3fee90f8d9f7132ea1e66902d78edb0951ca84cceab266f5c451", 0x30, 0x80000001}, {&(0x7f00000003c0)="33c93a709e246576", 0x8, 0x1}], 0x880010, &(0x7f0000000500)={[{@mblk_io_submit='mblk_io_submit'}, {@oldalloc='oldalloc'}, {@nolazytime='nolazytime'}, {@quota='quota'}, {@resgid={'resgid', 0x3d, r2}}, {@dioread_lock='dioread_lock'}], [{@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@uid_lt={'uid<', r3}}]}) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x4002, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000080)={0x8c, r4, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x357}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffff8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xc4}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffffe}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1ff}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:16 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_i0ize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:16 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x3, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0x0, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:16 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'deb-g_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:16 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x0, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:16 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x9, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000000)={0x2, 0x9, 0x8, 0x0, 0x5}) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:16 executing program 1: r0 = open(&(0x7f00000003c0)='./file0\x00', 0xc000, 0x10) accept4$alg(r0, 0x0, 0x0, 0x80000) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x2000000000001) getsockname$netrom(r1, &(0x7f0000000040)={{}, [@rose, @rose, @default, @bcast, @default, @remote, @bcast, @default]}, &(0x7f0000000240)=0x734b4c94) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0xffffffffffffffff, r1, 0x0, 0x34, &(0x7f0000000140)='#systemvboxnet0selinuxnodevwlan1$vmnet1:#&wlan1#\x85lo\x00'}, 0x30) fcntl$setown(r0, 0x8, r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.swap.current\x00', 0x7a05, 0x1700) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000280)={0xfffffffffffffffa, 0x46c, 0x4}) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x80381, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x7a0f, 0x1700) getpeername$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f0000000400)={0xffff, 0x8000, 0x4, 'queue1\x00', 0x200}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f00000002c0)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000340)={r7, 0x100000001}, &(0x7f0000000380)=0x8) 20:41:16 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:16 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'deb.g_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:16 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_iXize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:16 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x0, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:16 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x7, 0x400100) ioctl$VIDIOC_G_OUTPUT(r0, 0x8004562e, &(0x7f00000002c0)) unlink(&(0x7f0000000140)='./file0\x00') r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r1, &(0x7f00000001c0)="a7931b1888e787cfb4f9b2e64d0b5ec2a2076ebd8927c22c6b9d3fff74e926bb9ca30943cb09d520ee5647ab14f016a0e9ead269dd622df036095b24a63e7d0493919805237ba5dda1538a6a48eb4fa8ccfbb2a62dc37984c2a2857974a8eda82eb8fc74e66811b98a90f7f15498690cd44e3838ea5a186c5735ecf56c0b1fc84e3cbf37526235183716f3d185caa065bb8af97cc603fc06d5c01437a2da59d2be2ff154a41092475f72d2", &(0x7f0000000040)="0495563b65dda7c4120147", 0x971437a40089f2a1}, 0x20) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000000)) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', 0x0, 0x8afaa08ec14128e6, 0x0) 20:41:16 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x0, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:16 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000000)=r0, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1000) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:16 executing program 5 (fault-call:2 fault-nth:0): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) 20:41:16 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_icize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:16 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'deb0g_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:16 executing program 1: r0 = open(&(0x7f00000003c0)='./file0\x00', 0xc000, 0x10) accept4$alg(r0, 0x0, 0x0, 0x80000) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x2000000000001) getsockname$netrom(r1, &(0x7f0000000040)={{}, [@rose, @rose, @default, @bcast, @default, @remote, @bcast, @default]}, &(0x7f0000000240)=0x734b4c94) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0xffffffffffffffff, r1, 0x0, 0x34, &(0x7f0000000140)='#systemvboxnet0selinuxnodevwlan1$vmnet1:#&wlan1#\x85lo\x00'}, 0x30) fcntl$setown(r0, 0x8, r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.swap.current\x00', 0x7a05, 0x1700) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000280)={0xfffffffffffffffa, 0x46c, 0x4}) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x80381, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x7a0f, 0x1700) getpeername$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f0000000400)={0xffff, 0x8000, 0x4, 'queue1\x00', 0x200}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f00000002c0)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000340)={r7, 0x100000001}, &(0x7f0000000380)=0x8) 20:41:16 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x0, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:16 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) accept4$ax25(r0, &(0x7f0000000000)={{0x3, @bcast}, [@remote, @null, @bcast, @remote, @remote, @null, @default, @rose]}, &(0x7f0000000080)=0x48, 0x80000) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400220) lsetxattr$security_selinux(&(0x7f0000000140)='./file1\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) [ 316.318681][T15812] FAULT_INJECTION: forcing a failure. [ 316.318681][T15812] name failslab, interval 1, probability 0, space 0, times 0 [ 316.338189][T15814] EXT4-fs: 27 callbacks suppressed [ 316.338201][T15814] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_icize=0x0000000000000000" or missing value [ 316.393005][T15812] CPU: 0 PID: 15812 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 316.401076][T15812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.411158][T15812] Call Trace: [ 316.414477][T15812] dump_stack+0x172/0x1f0 [ 316.418829][T15812] should_fail.cold+0xa/0x15 [ 316.423474][T15812] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 316.429308][T15812] ? ___might_sleep+0x163/0x280 [ 316.434194][T15812] __should_failslab+0x121/0x190 [ 316.439152][T15812] should_failslab+0x9/0x14 [ 316.443688][T15812] __kmalloc+0x2dc/0x740 [ 316.447956][T15812] ? fput_many+0x12c/0x1a0 [ 316.452392][T15812] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 316.458673][T15812] ? strnlen_user+0x1f0/0x280 [ 316.463373][T15812] ? __x64_sys_memfd_create+0x13c/0x470 [ 316.468938][T15812] __x64_sys_memfd_create+0x13c/0x470 [ 316.474331][T15812] ? memfd_fcntl+0x1550/0x1550 [ 316.479118][T15812] ? do_syscall_64+0x26/0x610 [ 316.483822][T15812] ? lockdep_hardirqs_on+0x418/0x5d0 [ 316.489131][T15812] ? trace_hardirqs_on+0x67/0x230 [ 316.494192][T15812] do_syscall_64+0x103/0x610 [ 316.498813][T15812] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 316.504734][T15812] RIP: 0033:0x4582b9 [ 316.508657][T15812] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 316.528467][T15812] RSP: 002b:00007fd7659bca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 316.536910][T15812] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004582b9 [ 316.544905][T15812] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bd207 [ 316.552903][T15812] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 316.560900][T15812] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd7659bd6d4 [ 316.568895][T15812] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 [ 316.582765][T15816] EXT4-fs (sda1): Unrecognized mount option "deb0g_want_extra_isize=0x0000000000000000" or missing value 20:41:17 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x0, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:17 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:ld_so_t:s0\x00', 0x1d, 0x2) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:17 executing program 5 (fault-call:2 fault-nth:1): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) 20:41:17 executing program 1: r0 = open(&(0x7f00000003c0)='./file0\x00', 0xc000, 0x10) accept4$alg(r0, 0x0, 0x0, 0x80000) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x2000000000001) getsockname$netrom(r1, &(0x7f0000000040)={{}, [@rose, @rose, @default, @bcast, @default, @remote, @bcast, @default]}, &(0x7f0000000240)=0x734b4c94) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0xffffffffffffffff, r1, 0x0, 0x34, &(0x7f0000000140)='#systemvboxnet0selinuxnodevwlan1$vmnet1:#&wlan1#\x85lo\x00'}, 0x30) fcntl$setown(r0, 0x8, r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.swap.current\x00', 0x7a05, 0x1700) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000280)={0xfffffffffffffffa, 0x46c, 0x4}) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x80381, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x7a0f, 0x1700) getpeername$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f0000000400)={0xffff, 0x8000, 0x4, 'queue1\x00', 0x200}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f00000002c0)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000340)={r7, 0x100000001}, &(0x7f0000000380)=0x8) [ 316.672890][T15826] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_icize=0x0000000000000000" or missing value 20:41:17 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x0, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 316.753247][T15831] EXT4-fs (sda1): Unrecognized mount option "deb0g_want_extra_isize=0x0000000000000000" or missing value 20:41:17 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_idize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) [ 316.836076][T15838] FAULT_INJECTION: forcing a failure. [ 316.836076][T15838] name failslab, interval 1, probability 0, space 0, times 0 [ 316.857481][T15838] CPU: 0 PID: 15838 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 316.865530][T15838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.865547][T15838] Call Trace: [ 316.878975][T15838] dump_stack+0x172/0x1f0 [ 316.883336][T15838] should_fail.cold+0xa/0x15 [ 316.888141][T15838] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 316.893985][T15838] ? ___might_sleep+0x163/0x280 [ 316.894004][T15838] __should_failslab+0x121/0x190 [ 316.894021][T15838] ? shmem_destroy_callback+0xc0/0xc0 [ 316.894033][T15838] should_failslab+0x9/0x14 [ 316.894047][T15838] kmem_cache_alloc+0x2b2/0x6f0 [ 316.894062][T15838] ? __alloc_fd+0x430/0x530 [ 316.894087][T15838] ? shmem_destroy_callback+0xc0/0xc0 [ 316.894103][T15838] shmem_alloc_inode+0x1c/0x50 20:41:17 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000002300)={0x3, 0x773, "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"}) lsetxattr$security_selinux(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', 0x0, 0xfffffc8e, 0x5) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000000)={0x101, 0xc, 0x4, 0x5010000, {}, {0x5, 0x0, 0x5, 0x81, 0x0, 0x4, "1e78f271"}, 0x8d38, 0x2, @userptr=0x7fff, 0x4}) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000100)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2, 0x56}) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000140)={0x100000001, 0x26, 0x16, 0x100, 0x3}) r3 = gettid() syz_open_procfs$namespace(r3, &(0x7f00000000c0)='ns/net\x00') write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000080)={0x2d, 0x4, 0x0, {0x0, 0x100000001, 0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2d) 20:41:17 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debXg_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) [ 316.894117][T15838] alloc_inode+0x66/0x190 [ 316.894132][T15838] new_inode_pseudo+0x19/0xf0 [ 316.894152][T15838] new_inode+0x1f/0x40 [ 316.928556][T15838] shmem_get_inode+0x84/0x780 [ 316.928579][T15838] __shmem_file_setup.part.0+0x7e/0x2b0 [ 316.928599][T15838] shmem_file_setup+0x66/0x90 [ 316.928621][T15838] __x64_sys_memfd_create+0x2a2/0x470 [ 316.942596][T15838] ? memfd_fcntl+0x1550/0x1550 [ 316.942612][T15838] ? do_syscall_64+0x26/0x610 [ 316.942628][T15838] ? lockdep_hardirqs_on+0x418/0x5d0 20:41:17 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x6c, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'bridge0\x00', {0x2, 0x4e22, @broadcast}}) [ 316.942644][T15838] ? trace_hardirqs_on+0x67/0x230 [ 316.942662][T15838] do_syscall_64+0x103/0x610 [ 316.942694][T15838] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 316.942705][T15838] RIP: 0033:0x4582b9 [ 316.942721][T15838] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 316.942729][T15838] RSP: 002b:00007fd7659bca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 20:41:17 executing program 5 (fault-call:2 fault-nth:2): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) [ 316.942743][T15838] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004582b9 [ 316.942751][T15838] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bd207 [ 316.942759][T15838] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 316.942776][T15838] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd7659bd6d4 [ 316.961784][T15838] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:17 executing program 1 (fault-call:2 fault-nth:0): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 317.170829][T15855] FAULT_INJECTION: forcing a failure. [ 317.170829][T15855] name failslab, interval 1, probability 0, space 0, times 0 [ 317.237768][T15855] CPU: 1 PID: 15855 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 317.245921][T15855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.245928][T15855] Call Trace: [ 317.245958][T15855] dump_stack+0x172/0x1f0 [ 317.245980][T15855] should_fail.cold+0xa/0x15 [ 317.246000][T15855] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 317.246021][T15855] ? ___might_sleep+0x163/0x280 [ 317.246041][T15855] __should_failslab+0x121/0x190 [ 317.246059][T15855] should_failslab+0x9/0x14 [ 317.246078][T15855] kmem_cache_alloc+0x2b2/0x6f0 [ 317.246093][T15855] ? current_time+0x6b/0x140 [ 317.246119][T15855] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 317.303865][T15855] ? lockdep_hardirqs_on+0x418/0x5d0 [ 317.309170][T15855] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.309187][T15855] ? timespec64_trunc+0xf0/0x180 [ 317.309209][T15855] __d_alloc+0x2e/0x8c0 [ 317.321041][T15855] d_alloc_pseudo+0x1e/0x30 [ 317.321058][T15855] alloc_file_pseudo+0xe2/0x280 [ 317.321072][T15855] ? alloc_file+0x4d0/0x4d0 [ 317.321090][T15855] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 317.321126][T15855] __shmem_file_setup.part.0+0x108/0x2b0 [ 317.334002][T15854] EXT4-fs (sda1): Unrecognized mount option "debXg_want_extra_isize=0x0000000000000000" or missing value [ 317.334636][T15855] shmem_file_setup+0x66/0x90 [ 317.334657][T15855] __x64_sys_memfd_create+0x2a2/0x470 [ 317.334685][T15855] ? memfd_fcntl+0x1550/0x1550 [ 317.334709][T15855] ? do_syscall_64+0x26/0x610 [ 317.356376][T15860] FAULT_INJECTION: forcing a failure. 20:41:18 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x0, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 317.356376][T15860] name failslab, interval 1, probability 0, space 0, times 0 [ 317.362275][T15855] ? lockdep_hardirqs_on+0x418/0x5d0 [ 317.362293][T15855] ? trace_hardirqs_on+0x67/0x230 [ 317.362313][T15855] do_syscall_64+0x103/0x610 [ 317.362333][T15855] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.362345][T15855] RIP: 0033:0x4582b9 [ 317.362360][T15855] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 317.362368][T15855] RSP: 002b:00007fd7659bca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 317.362390][T15855] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004582b9 [ 317.394457][T15855] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bd207 [ 317.394468][T15855] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 317.394475][T15855] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd7659bd6d4 [ 317.394482][T15855] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 [ 317.406229][T15860] CPU: 1 PID: 15860 Comm: syz-executor.1 Not tainted 5.1.0-rc4+ #59 [ 317.415723][T15860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.415730][T15860] Call Trace: [ 317.415754][T15860] dump_stack+0x172/0x1f0 [ 317.415773][T15860] should_fail.cold+0xa/0x15 [ 317.415790][T15860] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 317.415809][T15860] ? ___might_sleep+0x163/0x280 [ 317.415827][T15860] __should_failslab+0x121/0x190 [ 317.415841][T15860] should_failslab+0x9/0x14 20:41:18 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x4}) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, 0x4000, 0x1}) 20:41:18 executing program 1 (fault-call:2 fault-nth:1): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 20:41:18 executing program 5 (fault-call:2 fault-nth:3): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) [ 317.415863][T15860] __kmalloc+0x2dc/0x740 [ 317.439435][T15860] ? fput_many+0x12c/0x1a0 [ 317.439454][T15860] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 317.439468][T15860] ? strnlen_user+0x1f0/0x280 [ 317.439482][T15860] ? __x64_sys_memfd_create+0x13c/0x470 [ 317.439498][T15860] __x64_sys_memfd_create+0x13c/0x470 [ 317.439513][T15860] ? memfd_fcntl+0x1550/0x1550 [ 317.439538][T15860] ? do_syscall_64+0x26/0x610 [ 317.455968][T15860] ? lockdep_hardirqs_on+0x418/0x5d0 [ 317.455985][T15860] ? trace_hardirqs_on+0x67/0x230 [ 317.456004][T15860] do_syscall_64+0x103/0x610 [ 317.456025][T15860] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.456037][T15860] RIP: 0033:0x4582b9 [ 317.456059][T15860] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 317.472041][T15860] RSP: 002b:00007f601d78ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 317.472058][T15860] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004582b9 [ 317.472065][T15860] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bd207 [ 317.472072][T15860] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 317.472079][T15860] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f601d78d6d4 [ 317.472087][T15860] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 [ 317.692977][T15861] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_idize=0x0000000000000000" or missing value 20:41:18 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_iiize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) [ 317.771396][T15870] EXT4-fs (sda1): Unrecognized mount option "debXg_want_extra_isize=0x0000000000000000" or missing value [ 317.792826][T15874] FAULT_INJECTION: forcing a failure. [ 317.792826][T15874] name failslab, interval 1, probability 0, space 0, times 0 [ 317.807952][T15872] FAULT_INJECTION: forcing a failure. [ 317.807952][T15872] name failslab, interval 1, probability 0, space 0, times 0 [ 317.854311][T15874] CPU: 1 PID: 15874 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 317.862366][T15874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.862374][T15874] Call Trace: [ 317.862401][T15874] dump_stack+0x172/0x1f0 [ 317.862425][T15874] should_fail.cold+0xa/0x15 [ 317.862444][T15874] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 317.862466][T15874] ? ___might_sleep+0x163/0x280 [ 317.862486][T15874] __should_failslab+0x121/0x190 20:41:18 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x3) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000000)={0x4, 0x81, 0x8, 0x7, 0x6, 0x21, 0x7, "9d8cf38e8f2960c4463867c373871a11ad91490e", "b8000a44fbe07a196149f32b771bf26156f0140b"}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000280)={0xc0e, 0xfffffffffffffe01, 0x3, 'queue0\x00', 0x5d5c}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:18 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x0, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 317.862503][T15874] should_failslab+0x9/0x14 [ 317.862522][T15874] kmem_cache_alloc+0x2b2/0x6f0 [ 317.862545][T15874] __alloc_file+0x27/0x300 [ 317.862562][T15874] alloc_empty_file+0x72/0x170 [ 317.862588][T15874] alloc_file+0x5e/0x4d0 [ 317.862617][T15874] alloc_file_pseudo+0x189/0x280 [ 317.884928][T15874] ? alloc_file+0x4d0/0x4d0 [ 317.884950][T15874] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 317.884977][T15874] __shmem_file_setup.part.0+0x108/0x2b0 [ 317.884998][T15874] shmem_file_setup+0x66/0x90 20:41:18 executing program 5 (fault-call:2 fault-nth:4): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) [ 317.895809][T15874] __x64_sys_memfd_create+0x2a2/0x470 [ 317.895825][T15874] ? memfd_fcntl+0x1550/0x1550 [ 317.895839][T15874] ? do_syscall_64+0x26/0x610 [ 317.895854][T15874] ? lockdep_hardirqs_on+0x418/0x5d0 [ 317.895869][T15874] ? trace_hardirqs_on+0x67/0x230 [ 317.895888][T15874] do_syscall_64+0x103/0x610 [ 317.895908][T15874] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.895920][T15874] RIP: 0033:0x4582b9 [ 317.895944][T15874] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 317.910245][T15874] RSP: 002b:00007fd76599ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 317.910261][T15874] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004582b9 [ 317.910268][T15874] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bd207 [ 317.910276][T15874] RBP: 000000000073bfa0 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 317.910285][T15874] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd76599c6d4 [ 317.910293][T15874] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 [ 317.966732][T15872] CPU: 1 PID: 15872 Comm: syz-executor.1 Not tainted 5.1.0-rc4+ #59 [ 318.066713][T15872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.076786][T15872] Call Trace: [ 318.080103][T15872] dump_stack+0x172/0x1f0 [ 318.084565][T15872] should_fail.cold+0xa/0x15 [ 318.097028][T15872] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 318.102861][T15872] ? ___might_sleep+0x163/0x280 [ 318.107733][T15872] __should_failslab+0x121/0x190 [ 318.112715][T15872] ? shmem_destroy_callback+0xc0/0xc0 [ 318.118282][T15872] should_failslab+0x9/0x14 [ 318.122845][T15872] kmem_cache_alloc+0x2b2/0x6f0 [ 318.127726][T15872] ? __alloc_fd+0x430/0x530 [ 318.132251][T15872] ? shmem_destroy_callback+0xc0/0xc0 [ 318.137640][T15872] shmem_alloc_inode+0x1c/0x50 [ 318.142426][T15872] alloc_inode+0x66/0x190 [ 318.147035][T15872] new_inode_pseudo+0x19/0xf0 [ 318.151734][T15872] new_inode+0x1f/0x40 [ 318.155820][T15872] shmem_get_inode+0x84/0x780 [ 318.160518][T15872] __shmem_file_setup.part.0+0x7e/0x2b0 [ 318.166085][T15872] shmem_file_setup+0x66/0x90 [ 318.170780][T15872] __x64_sys_memfd_create+0x2a2/0x470 [ 318.176171][T15872] ? memfd_fcntl+0x1550/0x1550 [ 318.180951][T15872] ? do_syscall_64+0x26/0x610 [ 318.185646][T15872] ? lockdep_hardirqs_on+0x418/0x5d0 [ 318.190975][T15872] ? trace_hardirqs_on+0x67/0x230 [ 318.196038][T15872] do_syscall_64+0x103/0x610 [ 318.200647][T15872] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 318.206565][T15872] RIP: 0033:0x4582b9 [ 318.210490][T15872] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 318.230109][T15872] RSP: 002b:00007f601d78ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 318.238542][T15872] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004582b9 [ 318.246551][T15872] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bd207 [ 318.254540][T15872] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 318.262528][T15872] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f601d78d6d4 [ 318.270520][T15872] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:18 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debcg_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) [ 318.359116][T15884] FAULT_INJECTION: forcing a failure. [ 318.359116][T15884] name failslab, interval 1, probability 0, space 0, times 0 [ 318.387967][T15884] CPU: 1 PID: 15884 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 318.396016][T15884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.406094][T15884] Call Trace: [ 318.409414][T15884] dump_stack+0x172/0x1f0 [ 318.413771][T15884] should_fail.cold+0xa/0x15 [ 318.418388][T15884] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 318.424220][T15884] ? ___might_sleep+0x163/0x280 [ 318.429089][T15884] __should_failslab+0x121/0x190 [ 318.434045][T15884] should_failslab+0x9/0x14 [ 318.438559][T15884] kmem_cache_alloc+0x2b2/0x6f0 [ 318.443430][T15884] ? rcu_read_lock_sched_held+0x110/0x130 [ 318.449160][T15884] ? kmem_cache_alloc+0x32e/0x6f0 [ 318.454209][T15884] security_file_alloc+0x39/0x170 [ 318.459251][T15884] __alloc_file+0xac/0x300 [ 318.463768][T15884] alloc_empty_file+0x72/0x170 [ 318.468559][T15884] alloc_file+0x5e/0x4d0 [ 318.472824][T15884] alloc_file_pseudo+0x189/0x280 [ 318.477791][T15884] ? alloc_file+0x4d0/0x4d0 [ 318.482488][T15884] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 318.488757][T15884] __shmem_file_setup.part.0+0x108/0x2b0 [ 318.494422][T15884] shmem_file_setup+0x66/0x90 [ 318.499213][T15884] __x64_sys_memfd_create+0x2a2/0x470 [ 318.504615][T15884] ? memfd_fcntl+0x1550/0x1550 [ 318.509402][T15884] ? do_syscall_64+0x26/0x610 [ 318.514101][T15884] ? lockdep_hardirqs_on+0x418/0x5d0 [ 318.519406][T15884] ? trace_hardirqs_on+0x67/0x230 [ 318.524447][T15884] do_syscall_64+0x103/0x610 [ 318.529082][T15884] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 318.535075][T15884] RIP: 0033:0x4582b9 [ 318.538987][T15884] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:41:19 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_ilize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:19 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) [ 318.558610][T15884] RSP: 002b:00007fd7659bca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 318.567043][T15884] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004582b9 [ 318.575035][T15884] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bd207 [ 318.583024][T15884] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 318.591019][T15884] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd7659bd6d4 [ 318.599004][T15884] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:19 executing program 5 (fault-call:2 fault-nth:5): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) 20:41:19 executing program 1 (fault-call:2 fault-nth:2): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 318.711895][T15893] EXT4-fs (sda1): Unrecognized mount option "debcg_want_extra_isize=0x0000000000000000" or missing value [ 318.753915][T15898] FAULT_INJECTION: forcing a failure. [ 318.753915][T15898] name failslab, interval 1, probability 0, space 0, times 0 [ 318.784815][T15898] CPU: 0 PID: 15898 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 318.792895][T15898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 20:41:19 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x0, 0x4) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) [ 318.802980][T15898] Call Trace: [ 318.806295][T15898] dump_stack+0x172/0x1f0 [ 318.810652][T15898] should_fail.cold+0xa/0x15 [ 318.815287][T15898] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 318.821132][T15898] ? ___might_sleep+0x163/0x280 [ 318.826011][T15898] __should_failslab+0x121/0x190 [ 318.830976][T15898] should_failslab+0x9/0x14 [ 318.835502][T15898] kmem_cache_alloc+0x2b2/0x6f0 [ 318.840372][T15898] ? notify_change+0x6d5/0xfb0 [ 318.845154][T15898] ? do_sys_ftruncate+0x41e/0x550 [ 318.850210][T15898] getname_flags+0xd6/0x5b0 [ 318.854739][T15898] getname+0x1a/0x20 [ 318.858683][T15898] do_sys_open+0x2c9/0x5d0 [ 318.863127][T15898] ? filp_open+0x80/0x80 [ 318.867421][T15898] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 318.873701][T15898] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 318.879189][T15898] ? do_syscall_64+0x26/0x610 [ 318.883892][T15898] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 318.889982][T15898] ? do_syscall_64+0x26/0x610 [ 318.894714][T15898] __x64_sys_open+0x7e/0xc0 [ 318.899251][T15898] do_syscall_64+0x103/0x610 [ 318.903879][T15898] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 318.914226][T15898] RIP: 0033:0x412251 [ 318.918136][T15898] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 318.937756][T15898] RSP: 002b:00007fd7659bca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 318.946191][T15898] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412251 20:41:19 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000080)={0x4, 0x80000001, 0x80, [], &(0x7f0000000040)={0x980001, 0xffffffff, [], @p_u16=&(0x7f0000000000)=0x7}}) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:19 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x0, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 318.946202][T15898] RDX: 00007fd7659bcb0a RSI: 0000000000000002 RDI: 00007fd7659bcb00 [ 318.946209][T15898] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 318.946216][T15898] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 318.946223][T15898] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 [ 318.986493][T15903] FAULT_INJECTION: forcing a failure. [ 318.986493][T15903] name failslab, interval 1, probability 0, space 0, times 0 [ 319.012552][T15892] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ilize=0x0000000000000000" or missing value [ 319.092396][T15907] EXT4-fs (sda1): Unrecognized mount option "debcg_want_extra_isize=0x0000000000000000" or missing value [ 319.096159][T15903] CPU: 0 PID: 15903 Comm: syz-executor.1 Not tainted 5.1.0-rc4+ #59 [ 319.111681][T15903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.121811][T15903] Call Trace: [ 319.125129][T15903] dump_stack+0x172/0x1f0 [ 319.129485][T15903] should_fail.cold+0xa/0x15 [ 319.134112][T15903] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 319.139947][T15903] ? ___might_sleep+0x163/0x280 [ 319.144830][T15903] __should_failslab+0x121/0x190 [ 319.149878][T15903] should_failslab+0x9/0x14 [ 319.155873][T15903] kmem_cache_alloc+0x2b2/0x6f0 [ 319.160743][T15903] ? current_time+0x6b/0x140 [ 319.165484][T15903] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 319.171318][T15903] ? lockdep_hardirqs_on+0x418/0x5d0 [ 319.176633][T15903] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 319.182907][T15903] ? timespec64_trunc+0xf0/0x180 [ 319.187872][T15903] __d_alloc+0x2e/0x8c0 [ 319.192058][T15903] d_alloc_pseudo+0x1e/0x30 [ 319.196597][T15903] alloc_file_pseudo+0xe2/0x280 [ 319.201478][T15903] ? alloc_file+0x4d0/0x4d0 [ 319.206001][T15903] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 319.212277][T15903] __shmem_file_setup.part.0+0x108/0x2b0 [ 319.218056][T15903] shmem_file_setup+0x66/0x90 [ 319.222766][T15903] __x64_sys_memfd_create+0x2a2/0x470 [ 319.228167][T15903] ? memfd_fcntl+0x1550/0x1550 [ 319.232952][T15903] ? do_syscall_64+0x26/0x610 [ 319.237829][T15903] ? lockdep_hardirqs_on+0x418/0x5d0 20:41:19 executing program 5 (fault-call:2 fault-nth:6): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) [ 319.243135][T15903] ? trace_hardirqs_on+0x67/0x230 [ 319.248186][T15903] do_syscall_64+0x103/0x610 [ 319.253948][T15903] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 319.259857][T15903] RIP: 0033:0x4582b9 [ 319.263771][T15903] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 319.283391][T15903] RSP: 002b:00007f601d78ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 20:41:19 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80000) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000080)=0xf041, 0x4) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000040)={r0, 0x101}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:20 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x0, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 319.291937][T15903] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004582b9 [ 319.299927][T15903] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bd207 [ 319.307924][T15903] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 319.315913][T15903] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f601d78d6d4 [ 319.323906][T15903] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:20 executing program 1 (fault-call:2 fault-nth:3): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 20:41:20 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debdg_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) [ 319.432066][T15912] FAULT_INJECTION: forcing a failure. [ 319.432066][T15912] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 319.445328][T15912] CPU: 1 PID: 15912 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 319.453324][T15912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.463657][T15912] Call Trace: [ 319.466987][T15912] dump_stack+0x172/0x1f0 [ 319.471348][T15912] should_fail.cold+0xa/0x15 [ 319.475968][T15912] ? __lock_acquire+0x548/0x3fb0 [ 319.481020][T15912] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 319.486862][T15912] ? __lock_acquire+0x548/0x3fb0 [ 319.491840][T15912] should_fail_alloc_page+0x50/0x60 [ 319.497078][T15912] __alloc_pages_nodemask+0x1a1/0x7e0 [ 319.502496][T15912] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 319.508239][T15912] ? find_held_lock+0x35/0x130 [ 319.513137][T15912] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 319.518986][T15912] cache_grow_begin+0x9c/0x860 [ 319.523779][T15912] ? getname_flags+0xd6/0x5b0 [ 319.528480][T15912] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 319.534755][T15912] kmem_cache_alloc+0x62d/0x6f0 [ 319.539628][T15912] ? notify_change+0x6d5/0xfb0 [ 319.544432][T15912] ? do_sys_ftruncate+0x41e/0x550 [ 319.549489][T15912] getname_flags+0xd6/0x5b0 [ 319.554019][T15912] getname+0x1a/0x20 [ 319.557933][T15912] do_sys_open+0x2c9/0x5d0 [ 319.562411][T15912] ? filp_open+0x80/0x80 [ 319.566685][T15912] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 319.572982][T15912] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 319.578466][T15912] ? do_syscall_64+0x26/0x610 [ 319.583164][T15912] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 319.589252][T15912] ? do_syscall_64+0x26/0x610 [ 319.593967][T15912] __x64_sys_open+0x7e/0xc0 [ 319.598498][T15912] do_syscall_64+0x103/0x610 [ 319.603114][T15912] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 319.609029][T15912] RIP: 0033:0x412251 [ 319.612942][T15912] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 319.632597][T15912] RSP: 002b:00007fd7659bca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 319.641028][T15912] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412251 [ 319.649022][T15912] RDX: 00007fd7659bcb0a RSI: 0000000000000002 RDI: 00007fd7659bcb00 [ 319.657101][T15912] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 319.665264][T15912] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 319.673251][T15912] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:20 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_ioize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) [ 319.808815][T15924] FAULT_INJECTION: forcing a failure. [ 319.808815][T15924] name failslab, interval 1, probability 0, space 0, times 0 [ 319.838876][T15924] CPU: 0 PID: 15924 Comm: syz-executor.1 Not tainted 5.1.0-rc4+ #59 [ 319.846962][T15924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.857039][T15924] Call Trace: [ 319.860374][T15924] dump_stack+0x172/0x1f0 [ 319.864739][T15924] should_fail.cold+0xa/0x15 [ 319.869368][T15924] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 319.875217][T15924] ? ___might_sleep+0x163/0x280 [ 319.880186][T15924] __should_failslab+0x121/0x190 [ 319.885153][T15924] should_failslab+0x9/0x14 [ 319.889694][T15924] kmem_cache_alloc+0x2b2/0x6f0 [ 319.894570][T15924] ? current_time+0x6b/0x140 [ 319.899184][T15924] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 319.905013][T15924] ? lockdep_hardirqs_on+0x418/0x5d0 [ 319.910321][T15924] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 319.916612][T15924] ? timespec64_trunc+0xf0/0x180 [ 319.921569][T15924] __d_alloc+0x2e/0x8c0 [ 319.925761][T15924] d_alloc_pseudo+0x1e/0x30 [ 319.930291][T15924] alloc_file_pseudo+0xe2/0x280 [ 319.935168][T15924] ? alloc_file+0x4d0/0x4d0 [ 319.939720][T15924] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 319.946000][T15924] __shmem_file_setup.part.0+0x108/0x2b0 [ 319.951677][T15924] shmem_file_setup+0x66/0x90 [ 319.956392][T15924] __x64_sys_memfd_create+0x2a2/0x470 [ 319.961792][T15924] ? memfd_fcntl+0x1550/0x1550 [ 319.966578][T15924] ? do_syscall_64+0x26/0x610 [ 319.971283][T15924] ? lockdep_hardirqs_on+0x418/0x5d0 [ 319.976595][T15924] ? trace_hardirqs_on+0x67/0x230 [ 319.981731][T15924] do_syscall_64+0x103/0x610 [ 319.986352][T15924] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 319.992253][T15924] RIP: 0033:0x4582b9 [ 319.996158][T15924] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 320.015969][T15924] RSP: 002b:00007f601d78ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 320.024391][T15924] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004582b9 [ 320.032373][T15924] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bd207 [ 320.040368][T15924] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 320.049855][T15924] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f601d78d6d4 20:41:20 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x0, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:20 executing program 5 (fault-call:2 fault-nth:7): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) 20:41:20 executing program 1 (fault-call:2 fault-nth:4): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 320.057866][T15924] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:20 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000000)=""/207) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:20 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debig_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) [ 320.217485][T15936] FAULT_INJECTION: forcing a failure. [ 320.217485][T15936] name failslab, interval 1, probability 0, space 0, times 0 [ 320.249331][T15940] FAULT_INJECTION: forcing a failure. [ 320.249331][T15940] name failslab, interval 1, probability 0, space 0, times 0 [ 320.271413][T15936] CPU: 0 PID: 15936 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 320.279480][T15936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.279487][T15936] Call Trace: [ 320.279516][T15936] dump_stack+0x172/0x1f0 [ 320.279538][T15936] should_fail.cold+0xa/0x15 [ 320.279563][T15936] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 320.307685][T15936] ? ___might_sleep+0x163/0x280 [ 320.312648][T15936] __should_failslab+0x121/0x190 [ 320.317629][T15936] should_failslab+0x9/0x14 [ 320.317645][T15936] kmem_cache_alloc+0x2b2/0x6f0 [ 320.317660][T15936] ? __save_stack_trace+0x99/0x100 [ 320.317690][T15936] __alloc_file+0x27/0x300 [ 320.336575][T15936] alloc_empty_file+0x72/0x170 [ 320.341364][T15936] path_openat+0xef/0x46e0 [ 320.345799][T15936] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 320.351624][T15936] ? kasan_slab_alloc+0xf/0x20 [ 320.356413][T15936] ? kmem_cache_alloc+0x11a/0x6f0 [ 320.361451][T15936] ? getname_flags+0xd6/0x5b0 [ 320.366228][T15936] ? getname+0x1a/0x20 [ 320.370307][T15936] ? do_sys_open+0x2c9/0x5d0 [ 320.374909][T15936] ? __x64_sys_open+0x7e/0xc0 [ 320.379598][T15936] ? do_syscall_64+0x103/0x610 [ 320.384375][T15936] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.390498][T15936] ? __lock_acquire+0x548/0x3fb0 [ 320.395457][T15936] ? __lock_acquire+0x548/0x3fb0 [ 320.400424][T15936] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 320.405827][T15936] ? __alloc_fd+0x430/0x530 [ 320.410359][T15936] do_filp_open+0x1a1/0x280 [ 320.414894][T15936] ? may_open_dev+0x100/0x100 [ 320.419596][T15936] ? lock_downgrade+0x880/0x880 [ 320.424500][T15936] ? kasan_check_read+0x11/0x20 [ 320.429367][T15936] ? do_raw_spin_unlock+0x57/0x270 [ 320.434495][T15936] ? _raw_spin_unlock+0x2d/0x50 [ 320.439364][T15936] ? __alloc_fd+0x430/0x530 [ 320.443911][T15936] do_sys_open+0x3fe/0x5d0 [ 320.448354][T15936] ? filp_open+0x80/0x80 [ 320.452612][T15936] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 320.458998][T15936] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 320.464476][T15936] ? do_syscall_64+0x26/0x610 [ 320.469176][T15936] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.475266][T15936] ? do_syscall_64+0x26/0x610 [ 320.479981][T15936] __x64_sys_open+0x7e/0xc0 [ 320.484508][T15936] do_syscall_64+0x103/0x610 [ 320.489124][T15936] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.495029][T15936] RIP: 0033:0x412251 [ 320.498949][T15936] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 320.518568][T15936] RSP: 002b:00007fd7659bca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 320.527008][T15936] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412251 [ 320.535002][T15936] RDX: 00007fd7659bcb0a RSI: 0000000000000002 RDI: 00007fd7659bcb00 [ 320.542998][T15936] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 320.551008][T15936] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 320.558997][T15936] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 [ 320.568196][T15940] CPU: 1 PID: 15940 Comm: syz-executor.1 Not tainted 5.1.0-rc4+ #59 [ 320.576293][T15940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.586360][T15940] Call Trace: [ 320.589687][T15940] dump_stack+0x172/0x1f0 [ 320.594145][T15940] should_fail.cold+0xa/0x15 [ 320.598751][T15940] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 320.604590][T15940] ? ___might_sleep+0x163/0x280 [ 320.609472][T15940] __should_failslab+0x121/0x190 [ 320.614453][T15940] should_failslab+0x9/0x14 [ 320.619007][T15940] kmem_cache_alloc+0x2b2/0x6f0 [ 320.623877][T15940] ? rcu_read_lock_sched_held+0x110/0x130 [ 320.629626][T15940] ? kmem_cache_alloc+0x32e/0x6f0 [ 320.634698][T15940] security_file_alloc+0x39/0x170 [ 320.639743][T15940] __alloc_file+0xac/0x300 [ 320.644183][T15940] alloc_empty_file+0x72/0x170 [ 320.648991][T15940] alloc_file+0x5e/0x4d0 [ 320.653255][T15940] alloc_file_pseudo+0x189/0x280 [ 320.658230][T15940] ? alloc_file+0x4d0/0x4d0 [ 320.662756][T15940] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 320.669039][T15940] __shmem_file_setup.part.0+0x108/0x2b0 [ 320.674922][T15940] shmem_file_setup+0x66/0x90 [ 320.679623][T15940] __x64_sys_memfd_create+0x2a2/0x470 [ 320.685011][T15940] ? memfd_fcntl+0x1550/0x1550 [ 320.689786][T15940] ? do_syscall_64+0x26/0x610 [ 320.694524][T15940] ? lockdep_hardirqs_on+0x418/0x5d0 [ 320.699847][T15940] ? trace_hardirqs_on+0x67/0x230 [ 320.704904][T15940] do_syscall_64+0x103/0x610 [ 320.709525][T15940] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.715432][T15940] RIP: 0033:0x4582b9 [ 320.719334][T15940] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 320.739071][T15940] RSP: 002b:00007f601d78ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 320.747503][T15940] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004582b9 [ 320.755492][T15940] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bd207 [ 320.763482][T15940] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 20:41:21 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x0, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:21 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_ipize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:21 executing program 5 (fault-call:2 fault-nth:8): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) [ 320.771472][T15940] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f601d78d6d4 [ 320.779461][T15940] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:21 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) syncfs(r0) socketpair$unix(0x1, 0x8000001, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:21 executing program 1 (fault-call:2 fault-nth:5): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 320.892700][T15949] FAULT_INJECTION: forcing a failure. [ 320.892700][T15949] name failslab, interval 1, probability 0, space 0, times 0 [ 320.922355][T15949] CPU: 1 PID: 15949 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 320.930841][T15949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.940922][T15949] Call Trace: [ 320.944242][T15949] dump_stack+0x172/0x1f0 [ 320.948605][T15949] should_fail.cold+0xa/0x15 [ 320.953228][T15949] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 320.959082][T15949] ? ___might_sleep+0x163/0x280 [ 320.963976][T15949] __should_failslab+0x121/0x190 [ 320.968942][T15949] should_failslab+0x9/0x14 [ 320.973475][T15949] kmem_cache_alloc+0x2b2/0x6f0 [ 320.977937][T15956] FAULT_INJECTION: forcing a failure. [ 320.977937][T15956] name failslab, interval 1, probability 0, space 0, times 0 [ 320.978352][T15949] ? rcu_read_lock_sched_held+0x110/0x130 [ 320.978371][T15949] ? kmem_cache_alloc+0x32e/0x6f0 [ 320.978393][T15949] security_file_alloc+0x39/0x170 [ 320.978413][T15949] __alloc_file+0xac/0x300 [ 321.011214][T15949] alloc_empty_file+0x72/0x170 [ 321.016006][T15949] path_openat+0xef/0x46e0 [ 321.020438][T15949] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 321.026267][T15949] ? kasan_slab_alloc+0xf/0x20 [ 321.031058][T15949] ? kmem_cache_alloc+0x11a/0x6f0 [ 321.036106][T15949] ? getname_flags+0xd6/0x5b0 [ 321.040808][T15949] ? getname+0x1a/0x20 [ 321.044898][T15949] ? do_sys_open+0x2c9/0x5d0 [ 321.049514][T15949] ? __x64_sys_open+0x7e/0xc0 [ 321.054215][T15949] ? do_syscall_64+0x103/0x610 [ 321.059012][T15949] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 321.065119][T15949] ? __lock_acquire+0x548/0x3fb0 [ 321.070081][T15949] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 321.075486][T15949] ? __alloc_fd+0x430/0x530 [ 321.080019][T15949] do_filp_open+0x1a1/0x280 [ 321.084539][T15949] ? may_open_dev+0x100/0x100 [ 321.089238][T15949] ? lock_downgrade+0x880/0x880 [ 321.094125][T15949] ? kasan_check_read+0x11/0x20 [ 321.099011][T15949] ? do_raw_spin_unlock+0x57/0x270 [ 321.104145][T15949] ? _raw_spin_unlock+0x2d/0x50 [ 321.109017][T15949] ? __alloc_fd+0x430/0x530 [ 321.113734][T15949] do_sys_open+0x3fe/0x5d0 [ 321.118178][T15949] ? filp_open+0x80/0x80 [ 321.122433][T15949] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 321.128712][T15949] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 321.134190][T15949] ? do_syscall_64+0x26/0x610 [ 321.138877][T15949] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 321.145048][T15949] ? do_syscall_64+0x26/0x610 [ 321.149771][T15949] __x64_sys_open+0x7e/0xc0 [ 321.155864][T15949] do_syscall_64+0x103/0x610 [ 321.160482][T15949] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 321.166394][T15949] RIP: 0033:0x412251 [ 321.170304][T15949] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 321.189925][T15949] RSP: 002b:00007fd7659bca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 321.198360][T15949] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412251 [ 321.206439][T15949] RDX: 00007fd7659bcb0a RSI: 0000000000000002 RDI: 00007fd7659bcb00 [ 321.214434][T15949] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 321.222426][T15949] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 321.230419][T15949] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 [ 321.238434][T15956] CPU: 0 PID: 15956 Comm: syz-executor.1 Not tainted 5.1.0-rc4+ #59 [ 321.246443][T15956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.256514][T15956] Call Trace: [ 321.259841][T15956] dump_stack+0x172/0x1f0 [ 321.264211][T15956] should_fail.cold+0xa/0x15 [ 321.264229][T15956] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 321.264247][T15956] ? ___might_sleep+0x163/0x280 [ 321.264265][T15956] __should_failslab+0x121/0x190 [ 321.264279][T15956] should_failslab+0x9/0x14 [ 321.264294][T15956] kmem_cache_alloc+0x2b2/0x6f0 [ 321.264315][T15956] ? notify_change+0x6d5/0xfb0 [ 321.274754][T15956] ? do_sys_ftruncate+0x41e/0x550 [ 321.303678][T15956] getname_flags+0xd6/0x5b0 [ 321.308299][T15956] getname+0x1a/0x20 [ 321.312222][T15956] do_sys_open+0x2c9/0x5d0 [ 321.316679][T15956] ? filp_open+0x80/0x80 [ 321.320971][T15956] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 321.327247][T15956] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 321.332736][T15956] ? do_syscall_64+0x26/0x610 [ 321.337442][T15956] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 321.343530][T15956] ? do_syscall_64+0x26/0x610 [ 321.348242][T15956] __x64_sys_open+0x7e/0xc0 [ 321.353062][T15956] do_syscall_64+0x103/0x610 [ 321.357708][T15956] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 321.363623][T15956] RIP: 0033:0x412251 [ 321.367544][T15956] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 20:41:22 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'deblg_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) [ 321.387169][T15956] RSP: 002b:00007f601d78ca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 321.395603][T15956] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412251 [ 321.403595][T15956] RDX: 00007f601d78cb0a RSI: 0000000000000002 RDI: 00007f601d78cb00 [ 321.411586][T15956] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 321.419599][T15956] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 321.427585][T15956] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:22 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x0, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:22 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) [ 321.482755][T15955] EXT4-fs: 3 callbacks suppressed [ 321.482770][T15955] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ipize=0x0000000000000000" or missing value [ 321.562477][T15962] EXT4-fs (sda1): Unrecognized mount option "deblg_want_extra_isize=0x0000000000000000" or missing value 20:41:22 executing program 5 (fault-call:2 fault-nth:9): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) 20:41:22 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000000)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000040)=0x4, &(0x7f0000000080)=0x4) 20:41:22 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x0, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 321.655124][T15966] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ipize=0x0000000000000000" or missing value 20:41:22 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000000)={0xf, 0x1f, 0x1, 0xacf}, 0xf) ioctl$KDMKTONE(r0, 0x4b30, 0xef) 20:41:22 executing program 1 (fault-call:2 fault-nth:6): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 20:41:22 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_iuize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) [ 321.742856][T15975] FAULT_INJECTION: forcing a failure. [ 321.742856][T15975] name failslab, interval 1, probability 0, space 0, times 0 [ 321.772231][T15975] CPU: 0 PID: 15975 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 321.780279][T15975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.790356][T15975] Call Trace: [ 321.793690][T15975] dump_stack+0x172/0x1f0 [ 321.798050][T15975] should_fail.cold+0xa/0x15 [ 321.802691][T15975] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 321.808530][T15975] ? ___might_sleep+0x163/0x280 [ 321.813412][T15975] __should_failslab+0x121/0x190 [ 321.818375][T15975] should_failslab+0x9/0x14 [ 321.822907][T15975] kmem_cache_alloc+0x2b2/0x6f0 [ 321.827806][T15975] ? __schedule+0x1387/0x1cc0 [ 321.832546][T15975] __kernfs_new_node+0xef/0x690 [ 321.837418][T15975] ? _raw_spin_unlock_irq+0x28/0x90 [ 321.842681][T15975] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 321.848163][T15975] ? kasan_check_read+0x11/0x20 [ 321.853137][T15975] ? _raw_spin_unlock_irq+0x5e/0x90 [ 321.858379][T15975] ? __schedule+0x1387/0x1cc0 [ 321.863097][T15975] ? __lock_acquire+0x548/0x3fb0 [ 321.868076][T15975] kernfs_new_node+0x99/0x130 [ 321.872791][T15975] kernfs_create_dir_ns+0x52/0x160 [ 321.877949][T15975] internal_create_group+0x7f8/0xc40 [ 321.883262][T15975] ? bd_set_size+0x89/0xb0 [ 321.887861][T15975] ? remove_files.isra.0+0x190/0x190 20:41:22 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x0, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 321.893189][T15975] sysfs_create_group+0x20/0x30 [ 321.898082][T15975] lo_ioctl+0x10af/0x2150 [ 321.902451][T15975] ? lo_rw_aio+0x1120/0x1120 [ 321.907088][T15975] blkdev_ioctl+0x6f2/0x1d10 [ 321.911717][T15975] ? blkpg_ioctl+0xa90/0xa90 [ 321.916338][T15975] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 321.922185][T15975] ? __fget+0x35a/0x550 [ 321.926378][T15975] block_ioctl+0xee/0x130 [ 321.930837][T15975] ? blkdev_fallocate+0x410/0x410 [ 321.935891][T15975] do_vfs_ioctl+0xd6e/0x1390 [ 321.940511][T15975] ? ioctl_preallocate+0x210/0x210 [ 321.945654][T15975] ? __fget+0x381/0x550 [ 321.949852][T15975] ? ksys_dup3+0x3e0/0x3e0 [ 321.954293][T15975] ? do_sys_open+0x31d/0x5d0 [ 321.958907][T15975] ? tomoyo_file_ioctl+0x23/0x30 [ 321.963870][T15975] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 321.970138][T15975] ? security_file_ioctl+0x93/0xc0 [ 321.975276][T15975] ksys_ioctl+0xab/0xd0 [ 321.979634][T15975] __x64_sys_ioctl+0x73/0xb0 [ 321.984267][T15975] do_syscall_64+0x103/0x610 [ 321.988887][T15975] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 321.994827][T15975] RIP: 0033:0x458127 [ 321.998733][T15975] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 322.018357][T15975] RSP: 002b:00007fd7659bca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 322.026792][T15975] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458127 [ 322.034784][T15975] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 322.042785][T15975] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 322.052291][T15975] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 322.060277][T15975] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 [ 322.100987][T15979] EXT4-fs (sda1): Unrecognized mount option "deblg_want_extra_isize=0x0000000000000000" or missing value 20:41:22 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x95) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) [ 322.141785][T15985] FAULT_INJECTION: forcing a failure. [ 322.141785][T15985] name failslab, interval 1, probability 0, space 0, times 0 [ 322.186022][T15985] CPU: 1 PID: 15985 Comm: syz-executor.1 Not tainted 5.1.0-rc4+ #59 [ 322.194079][T15985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.204157][T15985] Call Trace: [ 322.207481][T15985] dump_stack+0x172/0x1f0 [ 322.211848][T15985] should_fail.cold+0xa/0x15 [ 322.216472][T15985] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 322.222307][T15985] ? ___might_sleep+0x163/0x280 [ 322.227182][T15985] __should_failslab+0x121/0x190 [ 322.232140][T15985] should_failslab+0x9/0x14 [ 322.236678][T15985] kmem_cache_alloc+0x2b2/0x6f0 [ 322.241693][T15985] ? notify_change+0x6d5/0xfb0 [ 322.246583][T15985] ? do_sys_ftruncate+0x41e/0x550 [ 322.251728][T15985] getname_flags+0xd6/0x5b0 [ 322.256252][T15985] getname+0x1a/0x20 [ 322.260168][T15985] do_sys_open+0x2c9/0x5d0 [ 322.264608][T15985] ? filp_open+0x80/0x80 [ 322.268866][T15985] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 322.275138][T15985] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 322.280622][T15985] ? do_syscall_64+0x26/0x610 [ 322.285327][T15985] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 322.291416][T15985] ? do_syscall_64+0x26/0x610 [ 322.296135][T15985] __x64_sys_open+0x7e/0xc0 [ 322.300681][T15985] do_syscall_64+0x103/0x610 [ 322.305304][T15985] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 322.311217][T15985] RIP: 0033:0x412251 [ 322.315141][T15985] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 322.334770][T15985] RSP: 002b:00007f601d78ca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 322.343200][T15985] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412251 [ 322.351190][T15985] RDX: 00007f601d78cb0a RSI: 0000000000000002 RDI: 00007f601d78cb00 [ 322.359177][T15985] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 322.367254][T15985] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 322.375244][T15985] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:23 executing program 5 (fault-call:2 fault-nth:10): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) 20:41:23 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debog_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:23 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0x0, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:23 executing program 1 (fault-call:2 fault-nth:7): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 20:41:23 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x3) io_setup(0x7, &(0x7f0000000140)=0x0) io_getevents(r3, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) memfd_create(&(0x7f00000000c0), 0x0) io_submit(r3, 0x2000000000000262, &(0x7f0000002700)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x8, 0x7f3, r1, &(0x7f0000000280)="879b50d118b97552d11d3ff699d1b372c66403162bb97e6fb59b6c09cea35573f02879006a2275f0b0fb6cffa18f49dd97c01e263a7a12c079d6ad1047b08058429dd207e1a4b0761c6cd75e3a126b5d24f0d1a94a792b55db24e0bedcbeaf90cf9d6b374e82a3798911546e26ed7856e38e822afbadc9e8ba0bec2217fa217279fb93a2352c38e2a47f", 0x0, 0x9, 0x0, 0x2, r0}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x7, 0x5, r2, &(0x7f0000000340)="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", 0x0, 0x159, 0x0, 0x1, 0xffffffffffffff9c}, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x2, 0x5, r1, &(0x7f0000000440)="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", 0x0, 0x4, 0x0, 0x3, r0}, &(0x7f0000002480)={0x0, 0x0, 0x0, 0x6, 0x7f, r0, &(0x7f0000001480)="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", 0x0, 0x5, 0x0, 0x2, r0}, &(0x7f0000002500)={0x0, 0x0, 0x0, 0x7, 0xffffffff, r1, &(0x7f00000024c0)="6691f62f034472d6e130fa0fcbd84779a9a7daf3f8bcd696ace9297ffb78b526966d264c85dd9372dda11b94991fa5ecb17588", 0x0, 0x2fb51af0, 0x0, 0x2, r0}, &(0x7f0000002600)={0x0, 0x0, 0x0, 0x7, 0x3ff, r1, &(0x7f0000002540)="efa1493a804ae8cea2e992837e02e26e94ee9c6edfa39046af1eeb4c2b6ba8045f3e4e7591c9da3348805787dbaad9a80f83f123d5bcec6127614307f71736bef2fadc9a201bfdcc58e7b66107af17f43e8dc7df701d4635e3e4f7173231d8dd84557740f612178088f266bb6ea3c04b56455a7823258bd00e96a88d284004f3d4ca3ac621f1db4333b5520639be797f3af5dcc4e5cffaff30ca4ebe55b9aa79cd394bc6ff6c0c3cb60c07703c8ef815e1a6067af9fc430b890fd558", 0x0, 0x580000000000, 0x0, 0x1, r0}, &(0x7f00000026c0)={0x0, 0x0, 0x0, 0xe, 0x4, r0, &(0x7f0000002640)="00dd8f3f462318e0fb7a2e0465ca87951b557783df9d1aaabf034f13bef75ffd31c96998222305faae4f1586bd0c337be9e03ebde892644dc7ab50ee57e097f0d29582b4abbf420efc3dbb1e5215807a", 0x0, 0x81, 0x0, 0x1, r0}]) io_destroy(r3) creat(&(0x7f0000000000)='./file0\x00', 0xd) [ 322.497458][T15991] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iuize=0x0000000000000000" or missing value [ 322.580721][T16002] FAULT_INJECTION: forcing a failure. [ 322.580721][T16002] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 322.593989][T16002] CPU: 0 PID: 16002 Comm: syz-executor.1 Not tainted 5.1.0-rc4+ #59 [ 322.601983][T16002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.612063][T16002] Call Trace: [ 322.615402][T16002] dump_stack+0x172/0x1f0 [ 322.619782][T16002] should_fail.cold+0xa/0x15 [ 322.624402][T16002] ? __lock_acquire+0x548/0x3fb0 [ 322.629375][T16002] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 322.635216][T16002] ? __lock_acquire+0x548/0x3fb0 [ 322.640191][T16002] should_fail_alloc_page+0x50/0x60 [ 322.645422][T16002] __alloc_pages_nodemask+0x1a1/0x7e0 [ 322.650826][T16002] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 322.656573][T16002] ? find_held_lock+0x35/0x130 [ 322.661370][T16002] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 322.667207][T16002] cache_grow_begin+0x9c/0x860 [ 322.671998][T16002] ? getname_flags+0xd6/0x5b0 [ 322.676707][T16002] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 322.682981][T16002] kmem_cache_alloc+0x62d/0x6f0 [ 322.687854][T16002] ? notify_change+0x6d5/0xfb0 [ 322.692649][T16002] ? do_sys_ftruncate+0x41e/0x550 [ 322.697885][T16002] getname_flags+0xd6/0x5b0 [ 322.702419][T16002] getname+0x1a/0x20 [ 322.706344][T16002] do_sys_open+0x2c9/0x5d0 [ 322.710789][T16002] ? filp_open+0x80/0x80 [ 322.715053][T16002] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 322.721330][T16002] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 322.726824][T16002] ? do_syscall_64+0x26/0x610 [ 322.731533][T16002] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 322.737627][T16002] ? do_syscall_64+0x26/0x610 [ 322.742370][T16002] __x64_sys_open+0x7e/0xc0 [ 322.746923][T16002] do_syscall_64+0x103/0x610 [ 322.751544][T16002] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 322.757465][T16002] RIP: 0033:0x412251 [ 322.761384][T16002] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 322.781135][T16002] RSP: 002b:00007f601d78ca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 322.789571][T16002] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412251 [ 322.797563][T16002] RDX: 00007f601d78cb0a RSI: 0000000000000002 RDI: 00007f601d78cb00 [ 322.805557][T16002] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 322.813675][T16002] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 322.821681][T16002] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 [ 322.860431][T15998] FAULT_INJECTION: forcing a failure. [ 322.860431][T15998] name failslab, interval 1, probability 0, space 0, times 0 [ 322.873314][T15998] CPU: 0 PID: 15998 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 322.881310][T15998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.891405][T15998] Call Trace: [ 322.894727][T15998] dump_stack+0x172/0x1f0 [ 322.894749][T15998] should_fail.cold+0xa/0x15 [ 322.894770][T15998] ? fault_create_debugfs_attr+0x1e0/0x1e0 20:41:23 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_ixize'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) [ 322.904334][T15998] ? __save_stack_trace+0x99/0x100 [ 322.904355][T15998] __should_failslab+0x121/0x190 [ 322.904370][T15998] should_failslab+0x9/0x14 [ 322.904383][T15998] kmem_cache_alloc+0x47/0x6f0 [ 322.904398][T15998] ? save_stack+0xa9/0xd0 [ 322.904413][T15998] ? save_stack+0x45/0xd0 [ 322.904426][T15998] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 322.904439][T15998] ? kasan_slab_alloc+0xf/0x20 [ 322.904458][T15998] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 322.904475][T15998] idr_get_free+0x425/0x8d0 [ 322.904512][T15998] idr_alloc_u32+0x19e/0x330 [ 322.964407][T15998] ? __fprop_inc_percpu_max+0x230/0x230 [ 322.969987][T15998] ? mark_held_locks+0xf0/0xf0 [ 322.974789][T15998] idr_alloc_cyclic+0x132/0x270 [ 322.979682][T15998] ? idr_alloc+0x150/0x150 [ 322.984138][T15998] __kernfs_new_node+0x171/0x690 [ 322.989116][T15998] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 322.994607][T15998] ? finish_task_switch+0x118/0x780 [ 322.999830][T15998] ? __switch_to_asm+0x34/0x70 [ 323.004614][T15998] ? __switch_to_asm+0x40/0x70 [ 323.009491][T15998] ? __schedule+0x81f/0x1cc0 [ 323.014119][T15998] ? __lock_acquire+0x548/0x3fb0 [ 323.019115][T15998] kernfs_new_node+0x99/0x130 [ 323.023937][T15998] kernfs_create_dir_ns+0x52/0x160 [ 323.029088][T15998] internal_create_group+0x7f8/0xc40 [ 323.034423][T15998] ? bd_set_size+0x89/0xb0 [ 323.038901][T15998] ? remove_files.isra.0+0x190/0x190 [ 323.044227][T15998] sysfs_create_group+0x20/0x30 [ 323.049214][T15998] lo_ioctl+0x10af/0x2150 [ 323.053580][T15998] ? lo_rw_aio+0x1120/0x1120 [ 323.058288][T15998] blkdev_ioctl+0x6f2/0x1d10 [ 323.062912][T15998] ? blkpg_ioctl+0xa90/0xa90 [ 323.067524][T15998] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 323.073379][T15998] ? __fget+0x35a/0x550 [ 323.077561][T15998] block_ioctl+0xee/0x130 [ 323.082321][T15998] ? blkdev_fallocate+0x410/0x410 [ 323.090586][T15998] do_vfs_ioctl+0xd6e/0x1390 [ 323.095217][T15998] ? ioctl_preallocate+0x210/0x210 [ 323.100969][T15998] ? __fget+0x381/0x550 [ 323.105155][T15998] ? ksys_dup3+0x3e0/0x3e0 [ 323.109599][T15998] ? do_sys_open+0x31d/0x5d0 [ 323.114218][T15998] ? tomoyo_file_ioctl+0x23/0x30 [ 323.119176][T15998] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 323.125442][T15998] ? security_file_ioctl+0x93/0xc0 [ 323.130580][T15998] ksys_ioctl+0xab/0xd0 [ 323.134769][T15998] __x64_sys_ioctl+0x73/0xb0 [ 323.139391][T15998] do_syscall_64+0x103/0x610 [ 323.144118][T15998] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.150030][T15998] RIP: 0033:0x458127 [ 323.155363][T15998] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 323.174981][T15998] RSP: 002b:00007fd7659bca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 323.183415][T15998] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458127 [ 323.191402][T15998] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 323.199504][T15998] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 323.207498][T15998] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 323.215586][T15998] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 [ 323.239846][T16001] EXT4-fs (sda1): Unrecognized mount option "debog_want_extra_isize=0x0000000000000000" or missing value 20:41:23 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x10000, 0x0) r1 = getpid() symlink(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000200)='./file0\x00') perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x2, 0x9, 0x8001, 0x100, 0x0, 0x7, 0x40200, 0xa, 0x79, 0x5, 0xfffffffffffffe01, 0x5ff6, 0x100, 0x7a, 0x4, 0x80, 0x1, 0x80000001, 0x3, 0xd5, 0x3, 0x22a, 0x0, 0x6, 0x6d10, 0x3ff, 0x212c, 0x7f, 0x3, 0x6, 0x7, 0xff, 0x6, 0xc, 0x3ff, 0x9, 0x0, 0x1000, 0x3, @perf_bp={&(0x7f0000000040), 0xd}, 0x10000, 0x10000, 0x9, 0x0, 0x0, 0x8, 0x200}, r1, 0xf, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:24 executing program 5 (fault-call:2 fault-nth:11): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) [ 323.296111][T16002] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 323.334210][T16014] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ixize=0x0000000000000000" or missing value 20:41:24 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debpg_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:24 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 20:41:24 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0x0, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 323.440608][T16019] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ixize=0x0000000000000000" or missing value [ 323.468358][T16022] FAULT_INJECTION: forcing a failure. [ 323.468358][T16022] name failslab, interval 1, probability 0, space 0, times 0 20:41:24 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x80) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', 0x0, 0x3c0, 0x0) [ 323.502078][T16022] CPU: 0 PID: 16022 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 323.510124][T16022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.520198][T16022] Call Trace: [ 323.523606][T16022] dump_stack+0x172/0x1f0 [ 323.527967][T16022] should_fail.cold+0xa/0x15 [ 323.532612][T16022] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 323.538448][T16022] ? ___might_sleep+0x163/0x280 [ 323.543335][T16022] __should_failslab+0x121/0x190 [ 323.548297][T16022] should_failslab+0x9/0x14 [ 323.552910][T16022] kmem_cache_alloc+0x2b2/0x6f0 [ 323.557781][T16022] ? __schedule+0x1387/0x1cc0 [ 323.562486][T16022] __kernfs_new_node+0xef/0x690 [ 323.567356][T16022] ? _raw_spin_unlock_irq+0x28/0x90 [ 323.572583][T16022] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 323.578064][T16022] ? kasan_check_read+0x11/0x20 [ 323.582950][T16022] ? _raw_spin_unlock_irq+0x5e/0x90 [ 323.588165][T16022] ? __schedule+0x1387/0x1cc0 [ 323.592901][T16022] ? __lock_acquire+0x548/0x3fb0 [ 323.597863][T16022] kernfs_new_node+0x99/0x130 [ 323.602739][T16022] kernfs_create_dir_ns+0x52/0x160 [ 323.607882][T16022] internal_create_group+0x7f8/0xc40 [ 323.613186][T16022] ? bd_set_size+0x89/0xb0 [ 323.617631][T16022] ? remove_files.isra.0+0x190/0x190 [ 323.622956][T16022] sysfs_create_group+0x20/0x30 [ 323.627829][T16022] lo_ioctl+0x10af/0x2150 [ 323.632187][T16022] ? lo_rw_aio+0x1120/0x1120 [ 323.636808][T16022] blkdev_ioctl+0x6f2/0x1d10 [ 323.641423][T16022] ? blkpg_ioctl+0xa90/0xa90 [ 323.646038][T16022] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 323.651909][T16022] ? __fget+0x35a/0x550 [ 323.656102][T16022] block_ioctl+0xee/0x130 [ 323.661062][T16022] ? blkdev_fallocate+0x410/0x410 [ 323.666120][T16022] do_vfs_ioctl+0xd6e/0x1390 [ 323.670739][T16022] ? ioctl_preallocate+0x210/0x210 [ 323.675870][T16022] ? __fget+0x381/0x550 [ 323.680050][T16022] ? ksys_dup3+0x3e0/0x3e0 [ 323.684492][T16022] ? do_sys_open+0x31d/0x5d0 [ 323.689109][T16022] ? tomoyo_file_ioctl+0x23/0x30 [ 323.694082][T16022] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 323.700344][T16022] ? security_file_ioctl+0x93/0xc0 [ 323.705484][T16022] ksys_ioctl+0xab/0xd0 [ 323.709710][T16022] __x64_sys_ioctl+0x73/0xb0 [ 323.714331][T16022] do_syscall_64+0x103/0x610 [ 323.718943][T16022] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.724862][T16022] RIP: 0033:0x458127 [ 323.728773][T16022] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 323.748743][T16022] RSP: 002b:00007fd7659bca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 323.757176][T16022] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458127 [ 323.765170][T16022] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 323.773160][T16022] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 323.781148][T16022] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 323.789146][T16022] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:24 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_is\nze'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:24 executing program 5 (fault-call:2 fault-nth:12): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) [ 323.893453][T16027] EXT4-fs (sda1): Unrecognized mount option "debpg_want_extra_isize=0x0000000000000000" or missing value 20:41:24 executing program 4: creat(&(0x7f00000000c0)='./file0/file0\x00', 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:useradd_exec_t:s0\x00', 0x24, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x1b6, 0x10000) fallocate(r0, 0x0, 0x10001, 0x9) flock(r0, 0x0) 20:41:24 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0x0, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 324.051295][T16040] FAULT_INJECTION: forcing a failure. [ 324.051295][T16040] name failslab, interval 1, probability 0, space 0, times 0 [ 324.071461][T16040] CPU: 0 PID: 16040 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 324.079688][T16040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.089763][T16040] Call Trace: [ 324.093091][T16040] dump_stack+0x172/0x1f0 [ 324.097537][T16040] should_fail.cold+0xa/0x15 [ 324.102153][T16040] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 324.107984][T16040] ? ___might_sleep+0x163/0x280 [ 324.112864][T16040] __should_failslab+0x121/0x190 [ 324.117832][T16040] should_failslab+0x9/0x14 [ 324.122382][T16040] kmem_cache_alloc+0x2b2/0x6f0 [ 324.127261][T16040] ? find_held_lock+0x35/0x130 [ 324.132059][T16040] ? kernfs_activate+0x192/0x1f0 [ 324.137037][T16040] __kernfs_new_node+0xef/0x690 [ 324.141932][T16040] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 324.147420][T16040] ? lock_downgrade+0x880/0x880 [ 324.152303][T16040] ? kasan_check_write+0x14/0x20 [ 324.157272][T16040] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 324.162861][T16040] ? wait_for_completion+0x440/0x440 [ 324.168180][T16040] kernfs_new_node+0x99/0x130 [ 324.172894][T16040] __kernfs_create_file+0x51/0x340 [ 324.178129][T16040] sysfs_add_file_mode_ns+0x222/0x560 [ 324.183545][T16040] internal_create_group+0x35b/0xc40 [ 324.188862][T16040] ? bd_set_size+0x89/0xb0 [ 324.193402][T16040] ? remove_files.isra.0+0x190/0x190 [ 324.198738][T16040] sysfs_create_group+0x20/0x30 [ 324.203621][T16040] lo_ioctl+0x10af/0x2150 [ 324.208006][T16040] ? lo_rw_aio+0x1120/0x1120 [ 324.212620][T16040] blkdev_ioctl+0x6f2/0x1d10 [ 324.217238][T16040] ? blkpg_ioctl+0xa90/0xa90 [ 324.221850][T16040] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 324.227959][T16040] ? __fget+0x35a/0x550 [ 324.232144][T16040] block_ioctl+0xee/0x130 [ 324.236914][T16040] ? blkdev_fallocate+0x410/0x410 [ 324.241960][T16040] do_vfs_ioctl+0xd6e/0x1390 [ 324.246611][T16040] ? ioctl_preallocate+0x210/0x210 [ 324.251743][T16040] ? __fget+0x381/0x550 [ 324.255926][T16040] ? ksys_dup3+0x3e0/0x3e0 [ 324.260366][T16040] ? do_sys_open+0x31d/0x5d0 [ 324.264982][T16040] ? tomoyo_file_ioctl+0x23/0x30 [ 324.269939][T16040] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 324.276205][T16040] ? security_file_ioctl+0x93/0xc0 [ 324.281339][T16040] ksys_ioctl+0xab/0xd0 [ 324.285524][T16040] __x64_sys_ioctl+0x73/0xb0 [ 324.290314][T16040] do_syscall_64+0x103/0x610 [ 324.294958][T16040] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 324.300867][T16040] RIP: 0033:0x458127 [ 324.304774][T16040] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 324.324391][T16040] RSP: 002b:00007fd7659bca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 324.332822][T16040] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458127 [ 324.340812][T16040] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 324.348797][T16040] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 324.356804][T16040] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 324.364799][T16040] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:25 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debsg_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:25 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 20:41:25 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_is%ze'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:25 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000000), &(0x7f0000000040)=0x4) 20:41:25 executing program 5 (fault-call:2 fault-nth:13): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) 20:41:25 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x0, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:25 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x4000000000) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc_llcp={0x27, 0x1, 0x1, 0x0, 0x1, 0x2, "39a9f4443acec5477d4e9e7baeadd36ca3e226f8cc574d0e1082107af5fd86de76a105d63f6d1867f868ad5718cd5b1c53bbd1cbd90ec52b5b2933551ad28b", 0x27}, 0x80, &(0x7f0000001480)=[{&(0x7f0000000280)="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", 0x1000}, {&(0x7f00000000c0)="f27503b76240ec601fb17df202866c681d9e4fd62760eede3c4a6df048e92e20a7c3be346e8f22055a6f1d846a9bbc49862f1c6cf2a0d2982e292d03087ef2", 0x3f}, {&(0x7f0000000100)="1a55cbe3344b40a248cbf189cd9840594c380fc0f97345882b7b1cd827a652f86741f631feb6f174b02f5042684fc1c47992052216fe32630b84feab16f7", 0x3e}, {&(0x7f0000001280)="c884bdac5ed7b82a8dd9df721b602f1ef15fd565a5b622dce4884ef2893dd6e4ca4e3d21c74c7c30e04ab00a2f29d093e0cad9234a949f54ae48d3b4269a138c750c37919810e0bd6aad473a65e2e3841281f9c05f39b6c3d04310e9ab75df6967c5add26fb818a846f781e75ff253f5b85678fd3eb97d6484d04d67b4b2831a5b97744760dba25d1ffa7547a4a8e7435a7e8fa803d1dd4b95502bfbd7b17cd0a754fb1eb086fe1489e3dae5dc197b2f346f45f55f04cca57d2bf08c8e39ef600226fd73f98b1eb37a0407e11ee02ae8bc20bd3901277c269ad132dff1da9b1acf91ee26db8d4ef8e8bf9670d0e134362d99da4a2119", 0xf6}, {&(0x7f0000001380)="568b2072065ba72ca0c24919d3b28a14d0d3695b6f93db7e9480d1dd840ea839118bfbc27caefab73728451c55c3965b7af4a3aa034e7a36be47f4a0fffc847b9da8dab266f5b6cbe77bf2b51098bbc2430edfbbdc9012c534a8bae0136a21a30b305ca106d51f4439958873e1caa59a1e079f7fe51f963e408ce6488d35715e62286711e8807294e0a1ffa71d3ab42bb7e569e458c80eba0bcffa03909fd50d7941492ac71b4e07add6a085d9db8c02ea4d2c6b02f0a5fdad538c9e9e9e8cb6d784b3dec33892d0a19dc20b9c2cb051e4b55b10f61d875b7198bed57a91ce884c4346d493e4e24a", 0xe8}], 0x5, &(0x7f0000001500)=[{0x110, 0x110, 0x4, "902a72412f80cd6226fa3e41d1eeb717939f69a5bdbcdfa491367d648412d4a6a222c89acd725a774201b69393c364449989e8a662c8cb127fccd99ac3df233c1bc8e70a78319b8aa4813eb234a29bf5a26b8f7168bcfee614b02bd5bd05f79b76df87bceefe7a24191c1dba6e5906afcfd2589783e00792983ef8fb827e4cbcd125c77e199e3a3e95beaf2de81091dd55c9e9e47b625332c5bd15bc0f6c5791e17b613d6e03ec944771e9fdfe6b0c03f8e53d1af29d670be44d098255b4a72b0e4c2ecf006e36da3b9cabd012d4f9a14a6b576aab7fc244b746e58337bfe3a532b9f1e9499fdc7c8901b1819f4b6a0d9311781ed0b9f99a78d7b1c8"}, {0x48, 0x113, 0x73, "fe3ac0541b154b7960d1c73d4d3053613a84221cb6cad092c3d4d8ebb21be47136b3a95410a10d950225ef98416be695f67bbb9a75e1"}, {0x10, 0x10e, 0x4e4c394d}, {0x20, 0x11, 0x7fff, "28d89d69fe49a4727c2ad998"}, {0x98, 0x107, 0x0, "60de78fdf61e0c277e38174ed7a330ed8dd7b57642aa51ed1854be8ca0407709877e40c86bccdcfea65ebb8f012c192a228cbb952bd000a72c6f02532e4939b364ea1ebd86984748b961b9fc2d03342c0cdd27e9940aaa72c3ad7d7a7506f115b3b156ad012d90676589e217a5e037c9d7b253dec0e0aa98f691c8507a28a547ac"}], 0x220}, 0xc000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000001780)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x1d8, 0x3) ioctl$sock_bt_hci(r0, 0x400448df, &(0x7f00000017c0)="8e0925947675adbdb8112188975faf21982b1c5e96875616e578647ec7fee149752a50cc431682f57d97fecf87e9669f61284a78c7f8c501322317de3aed00bc061c937f56e52c576e4e5d721d9434841a20bfb9da9ad9b0594f8e36c4b0f21b4fff2b51b3b6e3673e587ada3ae8aabb5c9053d6542f42e9601140df4dccbd815e00bb4169632a5516035a1ef7b95c85959d0e5436") getrlimit(0xf, &(0x7f0000001740)) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) write$input_event(r0, &(0x7f0000000000)={{0x0, 0x2710}, 0x17, 0x1, 0x4}, 0x18) lsetxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='trusted.overlay.upper\x00', &(0x7f0000001880)={0x0, 0xfb, 0xbd, 0x1, 0x9a, "27d3c8aba9069fc777d6540e1fda698f", "aac525fa49c38d0e8fe5b5b30430b24787e2bdd577de8e6ba03b2bd5730c28a813bcbf2254d5a2d743cf3adfb272ccfa39dae05b6e556586779314f90722d183948809ffdd0ea315d871291c8975c747fa0fdd15522a46bac2a227e3cabdb5a9a43b2e5080f18ebd292d7c5be6d1054d69b1a6e827722c7cd2be23a3feb119c2fa12b6142919636da83afbf1b7d14fc9f06b6a090110c8a50107c62d3542191d45ae511b05bf464f"}, 0xbd, 0x2) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x14) [ 324.674654][T16063] FAULT_INJECTION: forcing a failure. [ 324.674654][T16063] name failslab, interval 1, probability 0, space 0, times 0 [ 324.726377][T16063] CPU: 1 PID: 16063 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 324.734419][T16063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.744492][T16063] Call Trace: [ 324.747812][T16063] dump_stack+0x172/0x1f0 [ 324.752181][T16063] should_fail.cold+0xa/0x15 [ 324.756802][T16063] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 324.762641][T16063] ? ___might_sleep+0x163/0x280 [ 324.767527][T16063] __should_failslab+0x121/0x190 [ 324.772486][T16063] should_failslab+0x9/0x14 [ 324.777008][T16063] kmem_cache_alloc+0x2b2/0x6f0 [ 324.782143][T16063] ? find_held_lock+0x35/0x130 [ 324.786939][T16063] ? kernfs_activate+0x192/0x1f0 [ 324.791901][T16063] __kernfs_new_node+0xef/0x690 [ 324.797330][T16063] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 324.802932][T16063] ? lock_downgrade+0x880/0x880 [ 324.807822][T16063] ? kasan_check_write+0x14/0x20 [ 324.812808][T16063] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 324.818380][T16063] ? wait_for_completion+0x440/0x440 [ 324.823738][T16063] kernfs_new_node+0x99/0x130 [ 324.828446][T16063] __kernfs_create_file+0x51/0x340 [ 324.833597][T16063] sysfs_add_file_mode_ns+0x222/0x560 [ 324.839011][T16063] internal_create_group+0x35b/0xc40 [ 324.844321][T16063] ? bd_set_size+0x89/0xb0 [ 324.848771][T16063] ? remove_files.isra.0+0x190/0x190 [ 324.854093][T16063] sysfs_create_group+0x20/0x30 [ 324.858973][T16063] lo_ioctl+0x10af/0x2150 [ 324.863335][T16063] ? lo_rw_aio+0x1120/0x1120 [ 324.867953][T16063] blkdev_ioctl+0x6f2/0x1d10 [ 324.872588][T16063] ? blkpg_ioctl+0xa90/0xa90 [ 324.877206][T16063] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 324.883050][T16063] ? __fget+0x35a/0x550 [ 324.887272][T16063] block_ioctl+0xee/0x130 [ 324.892849][T16063] ? blkdev_fallocate+0x410/0x410 [ 324.897907][T16063] do_vfs_ioctl+0xd6e/0x1390 [ 324.902537][T16063] ? ioctl_preallocate+0x210/0x210 [ 324.907690][T16063] ? __fget+0x381/0x550 [ 324.911877][T16063] ? ksys_dup3+0x3e0/0x3e0 [ 324.916316][T16063] ? do_sys_open+0x31d/0x5d0 [ 324.920932][T16063] ? tomoyo_file_ioctl+0x23/0x30 [ 324.925896][T16063] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 324.932162][T16063] ? security_file_ioctl+0x93/0xc0 [ 324.937308][T16063] ksys_ioctl+0xab/0xd0 [ 324.941493][T16063] __x64_sys_ioctl+0x73/0xb0 [ 324.946108][T16063] do_syscall_64+0x103/0x610 [ 324.950733][T16063] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 324.956645][T16063] RIP: 0033:0x458127 [ 324.960580][T16063] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 324.980211][T16063] RSP: 002b:00007fd7659bca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 324.988695][T16063] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458127 [ 324.996695][T16063] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 325.004694][T16063] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 325.012694][T16063] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 20:41:25 executing program 4: socket$isdn_base(0x22, 0x3, 0x0) r0 = creat(&(0x7f0000000000)='./file0/file0\x00', 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000040)=0x101, 0x4) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:25 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x3, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 20:41:25 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debxg_want_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:25 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x0, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 325.020715][T16063] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:25 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x80) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) creat(&(0x7f0000000100)='./file0\x00', 0x20) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/139, 0x8b) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) uselib(&(0x7f0000000180)='./file0\x00') lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:25 executing program 5 (fault-call:2 fault-nth:14): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) 20:41:25 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x0, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:25 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_ispze'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:25 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={0x0, 0xc32b, 0x3ff, 0x5fbe2faf}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000005c0)={r2, 0x90, &(0x7f00000004c0)=[@in6={0xa, 0x4e24, 0x5, @ipv4={[], [], @broadcast}, 0xe2f3}, @in={0x2, 0x4e20, @multicast2}, @in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e22, 0x72c8026a, @mcast2, 0x2e}, @in6={0xa, 0x4e23, 0x9, @empty, 0x9}, @in6={0xa, 0x4e23, 0x9, @mcast2, 0x7f}]}, &(0x7f0000000380)=0x10) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x14200414}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r3, 0x1, 0x70bd28, 0x25dfdbfc, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0xb90a}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8a40464ab9d24fca}, 0x8000) [ 325.288318][T16087] FAULT_INJECTION: forcing a failure. [ 325.288318][T16087] name failslab, interval 1, probability 0, space 0, times 0 [ 325.312112][T16087] CPU: 0 PID: 16087 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 325.320156][T16087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.330228][T16087] Call Trace: [ 325.333548][T16087] dump_stack+0x172/0x1f0 [ 325.337909][T16087] should_fail.cold+0xa/0x15 [ 325.342515][T16087] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 325.348331][T16087] ? ___might_sleep+0x163/0x280 [ 325.353213][T16087] __should_failslab+0x121/0x190 [ 325.358184][T16087] should_failslab+0x9/0x14 [ 325.362720][T16087] kmem_cache_alloc+0x2b2/0x6f0 [ 325.367603][T16087] ? lock_downgrade+0x880/0x880 [ 325.372481][T16087] ? kasan_check_read+0x11/0x20 [ 325.377363][T16087] __kernfs_new_node+0xef/0x690 [ 325.382252][T16087] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 325.387746][T16087] ? wait_for_completion+0x440/0x440 [ 325.393080][T16087] ? mutex_unlock+0xd/0x10 [ 325.397526][T16087] ? kernfs_activate+0x192/0x1f0 [ 325.402506][T16087] kernfs_new_node+0x99/0x130 [ 325.407248][T16087] __kernfs_create_file+0x51/0x340 [ 325.412483][T16087] sysfs_add_file_mode_ns+0x222/0x560 [ 325.417888][T16087] internal_create_group+0x35b/0xc40 [ 325.423226][T16087] ? bd_set_size+0x89/0xb0 [ 325.427686][T16087] ? remove_files.isra.0+0x190/0x190 [ 325.433014][T16087] sysfs_create_group+0x20/0x30 [ 325.437889][T16087] lo_ioctl+0x10af/0x2150 [ 325.442248][T16087] ? lo_rw_aio+0x1120/0x1120 [ 325.446887][T16087] blkdev_ioctl+0x6f2/0x1d10 [ 325.451512][T16087] ? blkpg_ioctl+0xa90/0xa90 [ 325.456238][T16087] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 325.462097][T16087] ? __fget+0x35a/0x550 [ 325.466285][T16087] block_ioctl+0xee/0x130 [ 325.470639][T16087] ? blkdev_fallocate+0x410/0x410 [ 325.475711][T16087] do_vfs_ioctl+0xd6e/0x1390 [ 325.480362][T16087] ? ioctl_preallocate+0x210/0x210 [ 325.485521][T16087] ? __fget+0x381/0x550 [ 325.489720][T16087] ? ksys_dup3+0x3e0/0x3e0 [ 325.494165][T16087] ? do_sys_open+0x31d/0x5d0 [ 325.499651][T16087] ? tomoyo_file_ioctl+0x23/0x30 [ 325.504629][T16087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 325.510931][T16087] ? security_file_ioctl+0x93/0xc0 [ 325.516080][T16087] ksys_ioctl+0xab/0xd0 [ 325.520267][T16087] __x64_sys_ioctl+0x73/0xb0 [ 325.524896][T16087] do_syscall_64+0x103/0x610 [ 325.529516][T16087] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 325.535436][T16087] RIP: 0033:0x458127 [ 325.539355][T16087] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 325.558978][T16087] RSP: 002b:00007fd7659bca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 325.567494][T16087] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458127 [ 325.575484][T16087] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 20:41:26 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0x0, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 325.583490][T16087] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 325.591558][T16087] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 325.599543][T16087] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:26 executing program 5 (fault-call:2 fault-nth:15): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) 20:41:26 executing program 4: r0 = creat(&(0x7f00000002c0)='./file0\x00', 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x12c) splice(r0, &(0x7f0000000080), r1, &(0x7f00000000c0), 0x2, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x420200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) linkat(r2, &(0x7f0000000180)='./file0\x00', r2, &(0x7f0000000200)='./file0\x00', 0x1400) write$UHID_CREATE2(r2, &(0x7f0000000300)={0xb, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0xaf, 0x2, 0x1, 0x2, 0xff, 0x6, "c7ae3ec340371871c904e0500dc0dbbb23a21e63d87f25925a10968692bec55bed3a9aa43ac0c49d4cb50f0d08c46099812276678483e962f9387f7c1423adcdfd461c4105e6bba93b3bf4a22e2ad5746dad8b39bf85eb25832b00d3367364aae49b1f67d1c1a30ed52f7d32cb82d8fcfc587ae1560fe3d4e7b68ee7c635af1ecd71bf2feca28e8cfd6f76d5ded17e18e3872502a1a7eeb2d0f79a296e797ade898dcb1e522c24eb84e376d8551a6d"}, 0x1c7) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/128) 20:41:26 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_w%nt_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:26 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x4, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 20:41:26 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0x0, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 325.794033][T16105] FAULT_INJECTION: forcing a failure. [ 325.794033][T16105] name failslab, interval 1, probability 0, space 0, times 0 [ 325.820997][T16105] CPU: 1 PID: 16105 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 325.829044][T16105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.839151][T16105] Call Trace: [ 325.842475][T16105] dump_stack+0x172/0x1f0 [ 325.846871][T16105] should_fail.cold+0xa/0x15 [ 325.851591][T16105] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 325.857623][T16105] ? ___might_sleep+0x163/0x280 [ 325.862513][T16105] __should_failslab+0x121/0x190 [ 325.867486][T16105] should_failslab+0x9/0x14 [ 325.872014][T16105] kmem_cache_alloc+0x2b2/0x6f0 [ 325.876897][T16105] ? lock_downgrade+0x880/0x880 [ 325.881861][T16105] ? kasan_check_read+0x11/0x20 [ 325.886751][T16105] __kernfs_new_node+0xef/0x690 [ 325.891636][T16105] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 325.897145][T16105] ? wait_for_completion+0x440/0x440 [ 325.902643][T16105] ? mutex_unlock+0xd/0x10 [ 325.907098][T16105] ? kernfs_activate+0x192/0x1f0 [ 325.912090][T16105] kernfs_new_node+0x99/0x130 [ 325.916798][T16105] __kernfs_create_file+0x51/0x340 [ 325.921934][T16105] sysfs_add_file_mode_ns+0x222/0x560 [ 325.927340][T16105] internal_create_group+0x35b/0xc40 [ 325.932651][T16105] ? bd_set_size+0x89/0xb0 [ 325.937108][T16105] ? remove_files.isra.0+0x190/0x190 [ 325.942450][T16105] sysfs_create_group+0x20/0x30 [ 325.947325][T16105] lo_ioctl+0x10af/0x2150 [ 325.951692][T16105] ? lo_rw_aio+0x1120/0x1120 [ 325.956318][T16105] blkdev_ioctl+0x6f2/0x1d10 [ 325.960933][T16105] ? blkpg_ioctl+0xa90/0xa90 [ 325.965548][T16105] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 325.971415][T16105] ? __fget+0x35a/0x550 [ 325.975605][T16105] block_ioctl+0xee/0x130 [ 325.979956][T16105] ? blkdev_fallocate+0x410/0x410 [ 325.985005][T16105] do_vfs_ioctl+0xd6e/0x1390 [ 325.989725][T16105] ? ioctl_preallocate+0x210/0x210 [ 325.994873][T16105] ? __fget+0x381/0x550 [ 325.999062][T16105] ? ksys_dup3+0x3e0/0x3e0 [ 326.003503][T16105] ? do_sys_open+0x31d/0x5d0 [ 326.008114][T16105] ? tomoyo_file_ioctl+0x23/0x30 [ 326.013077][T16105] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 326.019515][T16105] ? security_file_ioctl+0x93/0xc0 [ 326.024652][T16105] ksys_ioctl+0xab/0xd0 [ 326.028859][T16105] __x64_sys_ioctl+0x73/0xb0 [ 326.033476][T16105] do_syscall_64+0x103/0x610 [ 326.038092][T16105] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 326.044001][T16105] RIP: 0033:0x458127 [ 326.048792][T16105] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.068439][T16105] RSP: 002b:00007fd7659bca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 326.076871][T16105] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458127 [ 326.084860][T16105] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 20:41:26 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file1\x00', 0x30) connect$unix(r0, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e) [ 326.092844][T16105] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 326.100830][T16105] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 326.108813][T16105] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:26 executing program 5 (fault-call:2 fault-nth:16): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) 20:41:26 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0x0, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:27 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isi\ne'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:27 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x7f) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0xffffffffffffff90, 0x0) [ 326.422760][T16124] FAULT_INJECTION: forcing a failure. [ 326.422760][T16124] name failslab, interval 1, probability 0, space 0, times 0 [ 326.445203][T16124] CPU: 0 PID: 16124 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 326.455931][T16124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.466267][T16124] Call Trace: [ 326.469599][T16124] dump_stack+0x172/0x1f0 [ 326.473967][T16124] should_fail.cold+0xa/0x15 [ 326.478592][T16124] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 326.484430][T16124] ? ___might_sleep+0x163/0x280 [ 326.489306][T16124] __should_failslab+0x121/0x190 [ 326.494380][T16124] should_failslab+0x9/0x14 [ 326.498931][T16124] kmem_cache_alloc+0x2b2/0x6f0 [ 326.503811][T16124] ? lock_downgrade+0x880/0x880 [ 326.508696][T16124] ? kasan_check_read+0x11/0x20 [ 326.513585][T16124] __kernfs_new_node+0xef/0x690 [ 326.518466][T16124] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 326.524037][T16124] ? wait_for_completion+0x440/0x440 [ 326.529450][T16124] ? mutex_unlock+0xd/0x10 [ 326.533901][T16124] ? kernfs_activate+0x192/0x1f0 [ 326.538866][T16124] kernfs_new_node+0x99/0x130 [ 326.543737][T16124] __kernfs_create_file+0x51/0x340 [ 326.548919][T16124] sysfs_add_file_mode_ns+0x222/0x560 [ 326.554332][T16124] internal_create_group+0x35b/0xc40 [ 326.559653][T16124] ? bd_set_size+0x89/0xb0 [ 326.564120][T16124] ? remove_files.isra.0+0x190/0x190 [ 326.569447][T16124] sysfs_create_group+0x20/0x30 [ 326.574324][T16124] lo_ioctl+0x10af/0x2150 [ 326.578698][T16124] ? lo_rw_aio+0x1120/0x1120 [ 326.583317][T16124] blkdev_ioctl+0x6f2/0x1d10 [ 326.587947][T16124] ? blkpg_ioctl+0xa90/0xa90 [ 326.592569][T16124] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 326.598530][T16124] ? __fget+0x35a/0x550 [ 326.602816][T16124] block_ioctl+0xee/0x130 [ 326.607257][T16124] ? blkdev_fallocate+0x410/0x410 [ 326.612327][T16124] do_vfs_ioctl+0xd6e/0x1390 [ 326.617211][T16124] ? ioctl_preallocate+0x210/0x210 [ 326.622346][T16124] ? __fget+0x381/0x550 [ 326.626566][T16124] ? ksys_dup3+0x3e0/0x3e0 [ 326.631102][T16124] ? do_sys_open+0x31d/0x5d0 [ 326.635734][T16124] ? tomoyo_file_ioctl+0x23/0x30 [ 326.640707][T16124] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 326.646975][T16124] ? security_file_ioctl+0x93/0xc0 [ 326.652121][T16124] ksys_ioctl+0xab/0xd0 [ 326.656326][T16124] __x64_sys_ioctl+0x73/0xb0 [ 326.661039][T16124] do_syscall_64+0x103/0x610 [ 326.665663][T16124] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 326.671587][T16124] RIP: 0033:0x458127 [ 326.675681][T16124] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.695739][T16124] RSP: 002b:00007fd7659bca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 326.704271][T16124] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458127 [ 326.712260][T16124] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 326.720247][T16124] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 326.728236][T16124] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 326.736242][T16124] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:27 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x0, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:27 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_wan%_extra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:27 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_tables_targets\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xffffffffffffffff) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f000059dffc), &(0x7f0000000040)=0x4) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000000)={0x7f, 0xe}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xcf9a) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x44, 0x3) 20:41:27 executing program 5 (fault-call:2 fault-nth:17): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) 20:41:27 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x5, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 326.991791][T16139] EXT4-fs: 13 callbacks suppressed [ 326.991807][T16139] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isi [ 326.991807][T16139] e=0x0000000000000000" or missing value [ 327.069744][T16151] FAULT_INJECTION: forcing a failure. [ 327.069744][T16151] name failslab, interval 1, probability 0, space 0, times 0 [ 327.100014][T16151] CPU: 0 PID: 16151 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 327.108063][T16151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.118167][T16151] Call Trace: [ 327.121489][T16151] dump_stack+0x172/0x1f0 [ 327.125850][T16151] should_fail.cold+0xa/0x15 [ 327.130475][T16151] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 327.136316][T16151] ? ___might_sleep+0x163/0x280 [ 327.141194][T16151] __should_failslab+0x121/0x190 [ 327.146334][T16151] should_failslab+0x9/0x14 [ 327.150862][T16151] kmem_cache_alloc_trace+0x2d1/0x760 [ 327.157752][T16151] kobject_uevent_env+0x2fb/0x1030 [ 327.162899][T16151] kobject_uevent+0x20/0x26 [ 327.167423][T16151] lo_ioctl+0x112b/0x2150 [ 327.171783][T16151] ? lo_rw_aio+0x1120/0x1120 [ 327.176400][T16151] blkdev_ioctl+0x6f2/0x1d10 [ 327.181022][T16151] ? blkpg_ioctl+0xa90/0xa90 [ 327.185637][T16151] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 327.191573][T16151] ? __fget+0x35a/0x550 [ 327.195758][T16151] block_ioctl+0xee/0x130 [ 327.200114][T16151] ? blkdev_fallocate+0x410/0x410 [ 327.205173][T16151] do_vfs_ioctl+0xd6e/0x1390 [ 327.209790][T16151] ? ioctl_preallocate+0x210/0x210 [ 327.214919][T16151] ? __fget+0x381/0x550 [ 327.219107][T16151] ? ksys_dup3+0x3e0/0x3e0 [ 327.223538][T16151] ? do_sys_open+0x31d/0x5d0 [ 327.228245][T16151] ? tomoyo_file_ioctl+0x23/0x30 [ 327.233208][T16151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 327.239490][T16151] ? security_file_ioctl+0x93/0xc0 [ 327.244623][T16151] ksys_ioctl+0xab/0xd0 [ 327.248815][T16151] __x64_sys_ioctl+0x73/0xb0 [ 327.253425][T16151] do_syscall_64+0x103/0x610 [ 327.258033][T16151] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.263943][T16151] RIP: 0033:0x458127 [ 327.267854][T16151] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 327.287471][T16151] RSP: 002b:00007fd7659bca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 327.295901][T16151] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458127 [ 327.303910][T16151] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 327.311892][T16151] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 20:41:27 executing program 4: r0 = openat$cgroup_type(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000200)) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socket$packet(0x11, 0x406, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f0000000100)) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f00000002c0)) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000240), &(0x7f0000000280)=0x4) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x4000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:27 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x0, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 327.319883][T16151] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 327.327868][T16151] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 [ 327.385587][T16144] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 327.402434][T16142] EXT4-fs (sda1): Unrecognized mount option "debug_wan%_extra_isize=0x0000000000000000" or missing value 20:41:28 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x0, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 327.474777][T16158] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 327.496041][T16160] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isi [ 327.496041][T16160] e=0x0000000000000000" or missing value 20:41:28 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_%xtra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:28 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) pread64(r0, &(0x7f0000000000)=""/2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvfrom$unix(r2, &(0x7f0000000040)=""/8, 0x8, 0x100, &(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:28 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isi%e'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:28 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x6, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 20:41:28 executing program 5 (fault-call:2 fault-nth:18): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) 20:41:28 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x0, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 327.777194][T16168] EXT4-fs (sda1): Unrecognized mount option "debug_want_%xtra_isize=0x0000000000000000" or missing value [ 327.818664][T16175] FAULT_INJECTION: forcing a failure. [ 327.818664][T16175] name failslab, interval 1, probability 0, space 0, times 0 [ 327.834771][T16173] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 327.840100][T16175] CPU: 0 PID: 16175 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 327.851823][T16175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.861897][T16175] Call Trace: [ 327.865208][T16175] dump_stack+0x172/0x1f0 [ 327.869568][T16175] should_fail.cold+0xa/0x15 [ 327.874213][T16175] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 327.880048][T16175] ? ___might_sleep+0x163/0x280 [ 327.884934][T16175] __should_failslab+0x121/0x190 [ 327.889897][T16175] should_failslab+0x9/0x14 [ 327.894415][T16175] kmem_cache_alloc_trace+0x2d1/0x760 [ 327.899820][T16175] kobject_uevent_env+0x2fb/0x1030 [ 327.904961][T16175] kobject_uevent+0x20/0x26 [ 327.909485][T16175] lo_ioctl+0x112b/0x2150 [ 327.913884][T16175] ? lo_rw_aio+0x1120/0x1120 [ 327.918501][T16175] blkdev_ioctl+0x6f2/0x1d10 [ 327.923144][T16175] ? blkpg_ioctl+0xa90/0xa90 [ 327.927757][T16175] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 327.933595][T16175] ? __fget+0x35a/0x550 [ 327.937768][T16175] block_ioctl+0xee/0x130 [ 327.942113][T16175] ? blkdev_fallocate+0x410/0x410 [ 327.947155][T16175] do_vfs_ioctl+0xd6e/0x1390 [ 327.951767][T16175] ? ioctl_preallocate+0x210/0x210 [ 327.956896][T16175] ? __fget+0x381/0x550 [ 327.961085][T16175] ? ksys_dup3+0x3e0/0x3e0 [ 327.965521][T16175] ? do_sys_open+0x31d/0x5d0 [ 327.970133][T16175] ? tomoyo_file_ioctl+0x23/0x30 [ 327.975096][T16175] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 327.981375][T16175] ? security_file_ioctl+0x93/0xc0 [ 327.986509][T16175] ksys_ioctl+0xab/0xd0 [ 327.990702][T16175] __x64_sys_ioctl+0x73/0xb0 [ 327.995319][T16175] do_syscall_64+0x103/0x610 [ 327.999934][T16175] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 328.005870][T16175] RIP: 0033:0x458127 [ 328.009775][T16175] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 328.029392][T16175] RSP: 002b:00007fd7659bca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 328.037832][T16175] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458127 [ 328.047337][T16175] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 328.055327][T16175] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 20:41:28 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x0, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 328.063577][T16175] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 328.071577][T16175] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 [ 328.150136][T16179] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isi%e=0x0000000000000000" or missing value 20:41:28 executing program 5 (fault-call:2 fault-nth:19): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) [ 328.331666][T16194] FAULT_INJECTION: forcing a failure. [ 328.331666][T16194] name failslab, interval 1, probability 0, space 0, times 0 [ 328.345921][T16190] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 328.351770][T16194] CPU: 1 PID: 16194 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 328.362984][T16194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.362991][T16194] Call Trace: [ 328.363018][T16194] dump_stack+0x172/0x1f0 [ 328.363037][T16194] should_fail.cold+0xa/0x15 [ 328.363054][T16194] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 328.363072][T16194] ? ___might_sleep+0x163/0x280 [ 328.363091][T16194] __should_failslab+0x121/0x190 [ 328.363112][T16194] should_failslab+0x9/0x14 [ 328.396175][T16194] kmem_cache_alloc_node+0x264/0x710 [ 328.396193][T16194] ? find_held_lock+0x35/0x130 [ 328.396215][T16194] __alloc_skb+0xd5/0x5e0 [ 328.420282][T16194] ? skb_trim+0x190/0x190 [ 328.424633][T16194] ? kasan_check_read+0x11/0x20 [ 328.429532][T16194] alloc_uevent_skb+0x83/0x1e2 [ 328.434465][T16194] kobject_uevent_env+0xa63/0x1030 [ 328.439604][T16194] kobject_uevent+0x20/0x26 [ 328.444104][T16194] lo_ioctl+0x112b/0x2150 [ 328.448424][T16194] ? lo_rw_aio+0x1120/0x1120 [ 328.453047][T16194] blkdev_ioctl+0x6f2/0x1d10 [ 328.457632][T16194] ? blkpg_ioctl+0xa90/0xa90 [ 328.462297][T16194] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 328.468131][T16194] ? __fget+0x35a/0x550 [ 328.472302][T16194] block_ioctl+0xee/0x130 [ 328.476624][T16194] ? blkdev_fallocate+0x410/0x410 [ 328.481661][T16194] do_vfs_ioctl+0xd6e/0x1390 [ 328.486365][T16194] ? ioctl_preallocate+0x210/0x210 [ 328.491475][T16194] ? __fget+0x381/0x550 [ 328.495647][T16194] ? ksys_dup3+0x3e0/0x3e0 [ 328.500068][T16194] ? do_sys_open+0x31d/0x5d0 [ 328.504662][T16194] ? tomoyo_file_ioctl+0x23/0x30 [ 328.509617][T16194] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 328.515869][T16194] ? security_file_ioctl+0x93/0xc0 [ 328.521100][T16194] ksys_ioctl+0xab/0xd0 [ 328.525260][T16194] __x64_sys_ioctl+0x73/0xb0 [ 328.529939][T16194] do_syscall_64+0x103/0x610 [ 328.534528][T16194] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 328.540411][T16194] RIP: 0033:0x458127 [ 328.544319][T16194] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 328.563930][T16194] RSP: 002b:00007fd7659bca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 328.572332][T16194] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458127 20:41:29 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x0, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:29 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_ex%ra_isize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:29 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isiz\n'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) [ 328.580403][T16194] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 328.588454][T16194] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 328.596433][T16194] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 328.604404][T16194] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:29 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xfffffffffffffffe) sendmmsg(r2, &(0x7f0000003e80)=[{{&(0x7f0000000180)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x80, 0x0}}], 0x1, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000000)=0x5, 0x4) 20:41:29 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x7, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 20:41:29 executing program 5 (fault-call:2 fault-nth:20): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) [ 328.758996][T16200] EXT4-fs (sda1): Unrecognized mount option "debug_want_ex%ra_isize=0x0000000000000000" or missing value 20:41:29 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(md5-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) io_setup(0x6, &(0x7f0000000080)=0x0) io_submit(r2, 0x1, &(0x7f0000000500)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x335}]) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:29 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x0, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:29 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extr%_isize'}}, {@data_err_abort='data_err=abort'}]}) [ 328.975706][T16212] FAULT_INJECTION: forcing a failure. [ 328.975706][T16212] name failslab, interval 1, probability 0, space 0, times 0 [ 329.005541][T16212] CPU: 1 PID: 16212 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 329.013597][T16212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.024046][T16212] Call Trace: [ 329.027370][T16212] dump_stack+0x172/0x1f0 [ 329.031776][T16212] should_fail.cold+0xa/0x15 [ 329.036400][T16212] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 329.042325][T16212] ? ___might_sleep+0x163/0x280 [ 329.047204][T16212] __should_failslab+0x121/0x190 [ 329.052174][T16212] should_failslab+0x9/0x14 [ 329.056726][T16212] __kmalloc+0x2dc/0x740 [ 329.060994][T16212] ? kobject_uevent_env+0x2fb/0x1030 [ 329.066307][T16212] ? rcu_read_lock_sched_held+0x110/0x130 [ 329.072046][T16212] ? kobject_get_path+0xc4/0x1b0 [ 329.077007][T16212] kobject_get_path+0xc4/0x1b0 [ 329.081794][T16212] kobject_uevent_env+0x31f/0x1030 [ 329.086936][T16212] kobject_uevent+0x20/0x26 [ 329.091461][T16212] lo_ioctl+0x112b/0x2150 [ 329.095821][T16212] ? lo_rw_aio+0x1120/0x1120 [ 329.100433][T16212] blkdev_ioctl+0x6f2/0x1d10 [ 329.105057][T16212] ? blkpg_ioctl+0xa90/0xa90 [ 329.109681][T16212] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 329.115527][T16212] ? __fget+0x35a/0x550 [ 329.119793][T16212] block_ioctl+0xee/0x130 [ 329.124229][T16212] ? blkdev_fallocate+0x410/0x410 [ 329.129278][T16212] do_vfs_ioctl+0xd6e/0x1390 [ 329.133896][T16212] ? ioctl_preallocate+0x210/0x210 [ 329.139028][T16212] ? __fget+0x381/0x550 [ 329.143215][T16212] ? ksys_dup3+0x3e0/0x3e0 [ 329.147650][T16212] ? do_sys_open+0x31d/0x5d0 [ 329.152272][T16212] ? tomoyo_file_ioctl+0x23/0x30 [ 329.158845][T16212] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 329.165114][T16212] ? security_file_ioctl+0x93/0xc0 [ 329.170256][T16212] ksys_ioctl+0xab/0xd0 [ 329.174438][T16212] __x64_sys_ioctl+0x73/0xb0 [ 329.179138][T16212] do_syscall_64+0x103/0x610 [ 329.183752][T16212] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 329.189662][T16212] RIP: 0033:0x458127 [ 329.193600][T16212] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.213222][T16212] RSP: 002b:00007fd7659bca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 20:41:29 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x0, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 329.221742][T16212] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458127 [ 329.229728][T16212] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 329.237720][T16212] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 329.245717][T16212] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 329.253714][T16212] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:29 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000040)={@initdev, @multicast2, 0x0}, &(0x7f0000000080)=0xc) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x6, 0x4, 0x343, 0x4, r0, 0x100000000, [], r1, r0, 0xcc9, 0x7}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1000000000400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='security.selinux\x00', 0x0, 0x0, 0x1) openat(r0, &(0x7f0000000100)='./file0\x00', 0x101880, 0x2) 20:41:29 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x8, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 20:41:29 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isiz%'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:30 executing program 5 (fault-call:2 fault-nth:21): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) 20:41:30 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x0, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:30 executing program 4: getpeername(0xffffffffffffffff, &(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000000240)=0x80) connect$vsock_dgram(r0, &(0x7f00000004c0)={0x28, 0x0, 0xffffffff, @host}, 0x10) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x4000000000003, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000000400)=[{{&(0x7f0000000000)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000080)=""/165, 0xa5}, {&(0x7f0000000200)=""/18, 0x12}, {&(0x7f0000000280)=""/170, 0xaa}], 0x3, &(0x7f0000000380)=""/75, 0x4b}, 0x3}], 0x1, 0x40, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0285629, &(0x7f0000000580)={0x0, 0x9, 0x3, [], &(0x7f0000000540)=0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x6) prctl$PR_SET_DUMPABLE(0x4, 0x1) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:30 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x0, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:30 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_i#ize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:30 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x9, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 20:41:30 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x40000, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000000)=""/57, &(0x7f0000000040)=0x39) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', 0x0, 0xffffffffffffff0e, 0x1) [ 329.669151][T16244] FAULT_INJECTION: forcing a failure. [ 329.669151][T16244] name failslab, interval 1, probability 0, space 0, times 0 [ 329.688252][T16244] CPU: 0 PID: 16244 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 329.696292][T16244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.706356][T16244] Call Trace: [ 329.709686][T16244] dump_stack+0x172/0x1f0 [ 329.714035][T16244] should_fail.cold+0xa/0x15 [ 329.718625][T16244] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 329.724444][T16244] ? ___might_sleep+0x163/0x280 [ 329.729321][T16244] __should_failslab+0x121/0x190 [ 329.734279][T16244] should_failslab+0x9/0x14 [ 329.738809][T16244] kmem_cache_alloc+0x2b2/0x6f0 [ 329.743698][T16244] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 329.749533][T16244] ? lock_downgrade+0x880/0x880 [ 329.754413][T16244] skb_clone+0x150/0x3b0 [ 329.758691][T16244] netlink_broadcast_filtered+0x870/0xb20 [ 329.764446][T16244] netlink_broadcast+0x3a/0x50 20:41:30 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x0, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 329.769238][T16244] kobject_uevent_env+0xa94/0x1030 [ 329.774381][T16244] kobject_uevent+0x20/0x26 [ 329.778913][T16244] lo_ioctl+0x112b/0x2150 [ 329.783255][T16244] ? lo_rw_aio+0x1120/0x1120 [ 329.787840][T16244] blkdev_ioctl+0x6f2/0x1d10 [ 329.792426][T16244] ? blkpg_ioctl+0xa90/0xa90 [ 329.797009][T16244] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 329.802839][T16244] ? __fget+0x35a/0x550 [ 329.807009][T16244] block_ioctl+0xee/0x130 [ 329.811334][T16244] ? blkdev_fallocate+0x410/0x410 [ 329.816353][T16244] do_vfs_ioctl+0xd6e/0x1390 [ 329.820938][T16244] ? ioctl_preallocate+0x210/0x210 [ 329.826064][T16244] ? __fget+0x381/0x550 [ 329.830247][T16244] ? ksys_dup3+0x3e0/0x3e0 [ 329.834689][T16244] ? do_sys_open+0x31d/0x5d0 [ 329.839277][T16244] ? tomoyo_file_ioctl+0x23/0x30 [ 329.844231][T16244] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 329.850469][T16244] ? security_file_ioctl+0x93/0xc0 [ 329.855598][T16244] ksys_ioctl+0xab/0xd0 [ 329.859792][T16244] __x64_sys_ioctl+0x73/0xb0 [ 329.864427][T16244] do_syscall_64+0x103/0x610 [ 329.869015][T16244] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 329.874898][T16244] RIP: 0033:0x458127 [ 329.878798][T16244] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.898396][T16244] RSP: 002b:00007fd7659bca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 329.906808][T16244] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458127 [ 329.914966][T16244] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 329.923022][T16244] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 329.931004][T16244] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 329.938981][T16244] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:30 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isizp'}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:30 executing program 5 (fault-call:2 fault-nth:22): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) 20:41:30 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$apparmor_exec(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='stazk +.$posix_acl_accessd^,}\x00'], 0x1e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) getresuid(&(0x7f0000000100), &(0x7f0000000200), &(0x7f0000000280)=0x0) ioprio_get$uid(0x3, r1) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000040)=@sack_info={0x0, 0x800, 0xc17e}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={r2, 0x2, 0xa1f1, 0x2}, 0x10) 20:41:30 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x0, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 330.199713][T16271] FAULT_INJECTION: forcing a failure. [ 330.199713][T16271] name failslab, interval 1, probability 0, space 0, times 0 20:41:30 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x100000000400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:30 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x10, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 330.249357][T16271] CPU: 1 PID: 16271 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 330.257397][T16271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.267522][T16271] Call Trace: [ 330.270811][T16271] dump_stack+0x172/0x1f0 [ 330.275192][T16271] should_fail.cold+0xa/0x15 [ 330.279777][T16271] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 330.285585][T16271] ? ___might_sleep+0x163/0x280 [ 330.290432][T16271] __should_failslab+0x121/0x190 [ 330.295361][T16271] should_failslab+0x9/0x14 [ 330.299884][T16271] kmem_cache_alloc+0x2b2/0x6f0 [ 330.304746][T16271] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 330.310544][T16271] ? lock_downgrade+0x880/0x880 [ 330.315433][T16271] skb_clone+0x150/0x3b0 [ 330.319716][T16271] netlink_broadcast_filtered+0x870/0xb20 [ 330.325457][T16271] netlink_broadcast+0x3a/0x50 [ 330.330232][T16271] kobject_uevent_env+0xa94/0x1030 [ 330.335344][T16271] kobject_uevent+0x20/0x26 [ 330.339849][T16271] lo_ioctl+0x112b/0x2150 [ 330.344277][T16271] ? lo_rw_aio+0x1120/0x1120 [ 330.348877][T16271] blkdev_ioctl+0x6f2/0x1d10 [ 330.353466][T16271] ? blkpg_ioctl+0xa90/0xa90 [ 330.358051][T16271] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 330.363866][T16271] ? __fget+0x35a/0x550 [ 330.368017][T16271] block_ioctl+0xee/0x130 [ 330.372364][T16271] ? blkdev_fallocate+0x410/0x410 [ 330.377387][T16271] do_vfs_ioctl+0xd6e/0x1390 [ 330.381981][T16271] ? ioctl_preallocate+0x210/0x210 [ 330.387114][T16271] ? __fget+0x381/0x550 [ 330.391308][T16271] ? ksys_dup3+0x3e0/0x3e0 [ 330.395745][T16271] ? do_sys_open+0x31d/0x5d0 [ 330.400334][T16271] ? tomoyo_file_ioctl+0x23/0x30 [ 330.405382][T16271] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 330.411652][T16271] ? security_file_ioctl+0x93/0xc0 [ 330.416776][T16271] ksys_ioctl+0xab/0xd0 [ 330.420941][T16271] __x64_sys_ioctl+0x73/0xb0 [ 330.425519][T16271] do_syscall_64+0x103/0x610 [ 330.430121][T16271] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 330.436123][T16271] RIP: 0033:0x458127 [ 330.440004][T16271] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 330.459627][T16271] RSP: 002b:00007fd7659bca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 330.468044][T16271] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458127 [ 330.476011][T16271] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 330.483972][T16271] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 330.491946][T16271] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 330.514265][T16271] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:31 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x0, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:31 executing program 4: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000000)=""/9) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) setxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000280)=@v2={0x0, 0x3, 0x10, 0x6, 0x3b, "5cf8eedb92d23f6b32a97c63bfa922835a5edd9b540bed73e22b318e8f7039699191c64b8395ab8e2dcae7fdf42c56388e8ccb91cf86723db8c87e"}, 0x45, 0x2) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000080)={{0x39, 0x2, 0x9, 0x0, 0x6, 0x1}, 0x2}) 20:41:31 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_i%ize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:31 executing program 5 (fault-call:2 fault-nth:23): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) 20:41:31 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x8000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:31 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x0, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:31 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x2d}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:31 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2d, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 331.231132][T16297] FAULT_INJECTION: forcing a failure. [ 331.231132][T16297] name failslab, interval 1, probability 0, space 0, times 0 [ 331.250178][T16297] CPU: 0 PID: 16297 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 331.258390][T16297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.268468][T16297] Call Trace: [ 331.271798][T16297] dump_stack+0x172/0x1f0 [ 331.276160][T16297] should_fail.cold+0xa/0x15 [ 331.280790][T16297] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 331.286628][T16297] ? ___might_sleep+0x163/0x280 [ 331.291522][T16297] __should_failslab+0x121/0x190 [ 331.296493][T16297] should_failslab+0x9/0x14 [ 331.301039][T16297] kmem_cache_alloc+0x2b2/0x6f0 [ 331.305950][T16297] ? __fget+0x381/0x550 [ 331.310236][T16297] getname_flags+0xd6/0x5b0 [ 331.314810][T16297] do_mkdirat+0xa0/0x2a0 [ 331.319239][T16297] ? __ia32_sys_mknod+0xb0/0xb0 [ 331.324120][T16297] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 331.329610][T16297] ? do_syscall_64+0x26/0x610 [ 331.334313][T16297] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 331.340440][T16297] ? do_syscall_64+0x26/0x610 [ 331.345477][T16297] ? lockdep_hardirqs_on+0x418/0x5d0 [ 331.350795][T16297] __x64_sys_mkdir+0x5c/0x80 [ 331.355412][T16297] do_syscall_64+0x103/0x610 [ 331.360231][T16297] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 331.366141][T16297] RIP: 0033:0x4576d7 [ 331.370055][T16297] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 331.389709][T16297] RSP: 002b:00007fd7659bca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 331.398151][T16297] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004576d7 [ 331.406138][T16297] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000080 [ 331.414132][T16297] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 331.422124][T16297] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 20:41:32 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x0, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:32 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x51) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) write$P9_RLERRORu(r0, &(0x7f0000000000)={0x15, 0x7, 0x1, {{0x8, ',trusted'}, 0xffffffff7fffffff}}, 0x15) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) [ 331.430120][T16297] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:32 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x0, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:32 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x6) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:32 executing program 5 (fault-call:2 fault-nth:24): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) 20:41:32 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x0, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 331.853173][T16332] FAULT_INJECTION: forcing a failure. [ 331.853173][T16332] name failslab, interval 1, probability 0, space 0, times 0 [ 331.865930][T16332] CPU: 0 PID: 16332 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 331.873925][T16332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.884018][T16332] Call Trace: [ 331.887340][T16332] dump_stack+0x172/0x1f0 [ 331.891703][T16332] should_fail.cold+0xa/0x15 [ 331.896321][T16332] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 331.902146][T16332] ? __sigqueue_alloc+0x173/0x4d0 [ 331.907190][T16332] ? find_held_lock+0x35/0x130 [ 331.911975][T16332] __should_failslab+0x121/0x190 [ 331.916938][T16332] should_failslab+0x9/0x14 [ 331.921463][T16332] kmem_cache_alloc+0x47/0x6f0 [ 331.926781][T16332] ? kasan_check_read+0x11/0x20 [ 331.931660][T16332] __sigqueue_alloc+0x268/0x4d0 [ 331.936550][T16332] __send_signal+0xda3/0x1590 [ 331.941258][T16332] send_signal+0x49/0xd0 [ 331.945534][T16332] force_sig_info+0x251/0x310 [ 331.950242][T16332] force_sig_fault+0xbb/0xf0 [ 331.954852][T16332] ? force_sigsegv+0x120/0x120 [ 331.959646][T16332] ? trace_hardirqs_on+0x67/0x230 [ 331.964725][T16332] __bad_area_nosemaphore+0x332/0x420 [ 331.970137][T16332] bad_area+0x69/0x80 [ 331.974146][T16332] __do_page_fault+0x996/0xda0 [ 331.978943][T16332] do_page_fault+0x71/0x581 [ 331.983478][T16332] ? page_fault+0x8/0x30 [ 331.987746][T16332] page_fault+0x1e/0x30 [ 331.991919][T16332] RIP: 0033:0x451f6f 20:41:32 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_i*ize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:32 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socket(0x29bc773dd0ac463a, 0x80803, 0x5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='security.selinux\x00', 0x0, 0x0, 0x1) 20:41:32 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3b}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:32 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x3b, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 331.995835][T16332] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 332.015628][T16332] RSP: 002b:00007fd7659bca88 EFLAGS: 00010283 [ 332.021725][T16332] RAX: 00007fd7659bcae0 RBX: 0000000000000010 RCX: 0000000000000000 [ 332.029714][T16332] RDX: 000000000000001f RSI: 0000000000000000 RDI: 00007fd7659bcae0 [ 332.037801][T16332] RBP: 0000000000000000 R08: 000000000000001f R09: 000000000000000a [ 332.047119][T16332] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 332.055110][T16332] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:32 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x0, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:32 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:32 executing program 5 (fault-call:2 fault-nth:25): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) [ 332.230981][T16340] EXT4-fs: 22 callbacks suppressed [ 332.230995][T16340] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize;0x0000000000000000" or missing value [ 332.286805][T16345] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 20:41:33 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) getgroups(0x4, &(0x7f0000000000)=[0xffffffffffffffff, 0x0, 0xee00, 0xee00]) ioctl$TUNSETGROUP(r0, 0x400454ce, r1) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000040)={0x200, 0x5, 0x0, 0x7, 0x3, 0x5, 0x4, 0x3, 0x0}, &(0x7f0000000080)=0x20) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f00000000c0)={r2, 0xb0fc}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x10) [ 332.341446][T16348] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i*ize=0x0000000000000000" or missing value [ 332.409813][T16355] FAULT_INJECTION: forcing a failure. [ 332.409813][T16355] name failslab, interval 1, probability 0, space 0, times 0 [ 332.422555][T16355] CPU: 1 PID: 16355 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 332.430564][T16355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.440641][T16355] Call Trace: [ 332.443965][T16355] dump_stack+0x172/0x1f0 [ 332.448321][T16355] should_fail.cold+0xa/0x15 [ 332.452933][T16355] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 332.458796][T16355] ? __sigqueue_alloc+0x173/0x4d0 [ 332.463871][T16355] ? find_held_lock+0x35/0x130 [ 332.468679][T16355] __should_failslab+0x121/0x190 [ 332.473745][T16355] should_failslab+0x9/0x14 [ 332.478269][T16355] kmem_cache_alloc+0x47/0x6f0 [ 332.483053][T16355] ? kasan_check_read+0x11/0x20 [ 332.487931][T16355] __sigqueue_alloc+0x268/0x4d0 [ 332.493245][T16355] __send_signal+0xda3/0x1590 [ 332.497948][T16355] send_signal+0x49/0xd0 [ 332.502210][T16355] force_sig_info+0x251/0x310 [ 332.506933][T16355] force_sig_fault+0xbb/0xf0 [ 332.511541][T16355] ? force_sigsegv+0x120/0x120 [ 332.516343][T16355] ? trace_hardirqs_on+0x67/0x230 [ 332.521478][T16355] __bad_area_nosemaphore+0x332/0x420 [ 332.526870][T16355] bad_area+0x69/0x80 [ 332.530868][T16355] __do_page_fault+0x996/0xda0 [ 332.535659][T16355] do_page_fault+0x71/0x581 [ 332.540189][T16355] ? page_fault+0x8/0x30 [ 332.544468][T16355] page_fault+0x1e/0x30 [ 332.548636][T16355] RIP: 0033:0x451f6f [ 332.552555][T16355] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 332.572355][T16355] RSP: 002b:00007fd7659bca88 EFLAGS: 00010283 [ 332.578433][T16355] RAX: 00007fd7659bcae0 RBX: 0000000000000010 RCX: 0000000000000000 [ 332.586421][T16355] RDX: 000000000000001f RSI: 0000000000000000 RDI: 00007fd7659bcae0 [ 332.594410][T16355] RBP: 0000000000000000 R08: 000000000000001f R09: 000000000000000a [ 332.602405][T16355] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 20:41:33 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x0, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:33 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x70}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:33 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f00000000c0)={'bond_slave_1\x00', 0x7ff}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x2000000007}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000080)={r2, 0x3}, 0x8) [ 332.610391][T16355] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:33 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x48, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 332.795787][T16368] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 332.815277][T16370] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i*ize=0x0000000000000000" or missing value [ 332.907994][T16373] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isizep0x0000000000000000" or missing value 20:41:33 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_i+ize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:33 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x0, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:33 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) accept(r0, &(0x7f0000000040)=@can={0x1d, 0x0}, &(0x7f00000000c0)=0x80) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8002}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)=@gettfilter={0x34, 0x2e, 0xd989d2b73735a90c, 0x70bd25, 0x25dfdbfb, {0x0, r2, {0xe, 0xffff}, {0x7, 0x10}, {0xa, 0x8}}, [{0x8, 0xb, 0x3b2}, {0x8, 0xb, 0xcd}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0xb29a5598a8d17ac7) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f00000002c0)=""/2) 20:41:33 executing program 5 (fault-call:2 fault-nth:26): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) 20:41:33 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x4c, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 333.088552][T16381] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isizep0x0000000000000000" or missing value [ 333.111475][T16380] FAULT_INJECTION: forcing a failure. [ 333.111475][T16380] name failslab, interval 1, probability 0, space 0, times 0 [ 333.141023][T16380] CPU: 0 PID: 16380 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 333.149603][T16380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.160822][T16380] Call Trace: [ 333.164318][T16380] dump_stack+0x172/0x1f0 [ 333.168698][T16380] should_fail.cold+0xa/0x15 [ 333.173324][T16380] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 333.179944][T16380] ? ___might_sleep+0x163/0x280 [ 333.184842][T16380] __should_failslab+0x121/0x190 [ 333.189804][T16380] should_failslab+0x9/0x14 [ 333.194333][T16380] __kmalloc_track_caller+0x2d8/0x740 [ 333.199752][T16380] ? setup_sigcontext+0x7d0/0x7d0 [ 333.204897][T16380] ? __bad_area_nosemaphore+0xb3/0x420 [ 333.210380][T16380] ? strndup_user+0x77/0xd0 [ 333.214913][T16380] memdup_user+0x26/0xb0 [ 333.219184][T16380] strndup_user+0x77/0xd0 [ 333.223535][T16380] ksys_mount+0x3c/0x150 [ 333.227820][T16380] __x64_sys_mount+0xbe/0x150 [ 333.232545][T16380] do_syscall_64+0x103/0x610 [ 333.237194][T16380] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 333.243109][T16380] RIP: 0033:0x45ad2a [ 333.247025][T16380] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 333.266764][T16380] RSP: 002b:00007fd7659bca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 333.275191][T16380] RAX: ffffffffffffffda RBX: 00007fd7659bcb40 RCX: 000000000045ad2a [ 333.283187][T16380] RDX: 00007fd7659bcae0 RSI: 0000000020000080 RDI: 00007fd7659bcb00 20:41:33 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x0, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:33 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000200)=0x5) select(0x40, &(0x7f0000000040)={0xffffffffffff0001, 0x594, 0x80000001, 0x9, 0x4, 0x8, 0x7, 0x4}, &(0x7f0000000080)={0x5, 0x6, 0x1f, 0x2, 0x0, 0x95d, 0xffffffffffffffc0, 0x7}, &(0x7f00000000c0)={0x3, 0x3f, 0x5, 0x100, 0x800, 0x7, 0x5, 0x77b57bce}, &(0x7f0000000100)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0xc) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000280)) [ 333.291216][T16380] RBP: 0000000000000000 R08: 00007fd7659bcb40 R09: 00007fd7659bcae0 [ 333.299206][T16380] R10: 0000000000000025 R11: 0000000000000206 R12: 0000000000000005 [ 333.307196][T16380] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:34 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:34 executing program 5 (fault-call:2 fault-nth:27): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) [ 333.434197][T16387] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i+ize=0x0000000000000000" or missing value [ 333.465728][T16394] EXT4-fs warning (device sda1): ext4_group_extend:1769: can't shrink FS - resize aborted [ 333.481563][T16396] EXT4-fs warning (device sda1): ext4_group_extend:1769: can't shrink FS - resize aborted [ 333.512151][T16393] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 20:41:34 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x0, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:34 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) mq_timedreceive(r0, &(0x7f0000000000)=""/200, 0xc8, 0x1f, &(0x7f0000000100)={0x0, 0x989680}) creat(&(0x7f0000000200)='./file1\x00', 0x14) [ 333.611646][T16400] EXT4-fs (sda1): Unrecognized mount option "fowner>00000000000000000000" or missing value [ 333.634547][T16399] FAULT_INJECTION: forcing a failure. [ 333.634547][T16399] name failslab, interval 1, probability 0, space 0, times 0 [ 333.688345][T16399] CPU: 0 PID: 16399 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 333.696407][T16399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.706485][T16399] Call Trace: [ 333.709808][T16399] dump_stack+0x172/0x1f0 [ 333.714196][T16399] should_fail.cold+0xa/0x15 [ 333.718848][T16399] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 333.724697][T16399] ? ___might_sleep+0x163/0x280 [ 333.729579][T16399] __should_failslab+0x121/0x190 20:41:34 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x0, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 333.734556][T16399] should_failslab+0x9/0x14 [ 333.739707][T16399] __kmalloc_track_caller+0x2d8/0x740 [ 333.745118][T16399] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 333.745134][T16399] ? strndup_user+0x77/0xd0 [ 333.745154][T16399] memdup_user+0x26/0xb0 [ 333.745171][T16399] strndup_user+0x77/0xd0 [ 333.745187][T16399] ksys_mount+0x7b/0x150 [ 333.745203][T16399] __x64_sys_mount+0xbe/0x150 [ 333.745221][T16399] do_syscall_64+0x103/0x610 [ 333.745239][T16399] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 333.745250][T16399] RIP: 0033:0x45ad2a [ 333.745265][T16399] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 333.745273][T16399] RSP: 002b:00007fd7659bca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 333.745287][T16399] RAX: ffffffffffffffda RBX: 00007fd7659bcb40 RCX: 000000000045ad2a [ 333.745295][T16399] RDX: 00007fd7659bcae0 RSI: 0000000020000080 RDI: 00007fd7659bcb00 [ 333.745303][T16399] RBP: 0000000000000000 R08: 00007fd7659bcb40 R09: 00007fd7659bcae0 [ 333.745311][T16399] R10: 0000000000000025 R11: 0000000000000206 R12: 0000000000000005 [ 333.745328][T16399] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:34 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_i-ize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:34 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x1) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x36a, 0x0) 20:41:34 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x68, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 20:41:34 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:34 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x0, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:34 executing program 5 (fault-call:2 fault-nth:28): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) 20:41:34 executing program 4: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x20801, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000040)="c97e4f06886f") creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:34 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000280)={0x1e8, r3, 0x501, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2800000000000}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8001}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x50b8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe18b}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0xfc, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x98}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x800}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0x1e8}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) ioctl$SIOCGSTAMP(r2, 0x8906, &(0x7f0000000100)) 20:41:34 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_i.ize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:34 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x0, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 334.282640][T16433] FAULT_INJECTION: forcing a failure. [ 334.282640][T16433] name failslab, interval 1, probability 0, space 0, times 0 [ 334.327720][T16433] CPU: 1 PID: 16433 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 334.335767][T16433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.345850][T16433] Call Trace: [ 334.349172][T16433] dump_stack+0x172/0x1f0 [ 334.353975][T16433] should_fail.cold+0xa/0x15 [ 334.358602][T16433] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 334.358627][T16433] ? ___might_sleep+0x163/0x280 [ 334.358650][T16433] __should_failslab+0x121/0x190 [ 334.358683][T16433] should_failslab+0x9/0x14 [ 334.369366][T16433] __kmalloc_track_caller+0x2d8/0x740 [ 334.369384][T16433] ? setup_sigcontext+0x7d0/0x7d0 [ 334.369404][T16433] ? __bad_area_nosemaphore+0xb3/0x420 [ 334.369420][T16433] ? strndup_user+0x77/0xd0 [ 334.369438][T16433] memdup_user+0x26/0xb0 [ 334.369465][T16433] strndup_user+0x77/0xd0 [ 334.407889][T16433] ksys_mount+0x3c/0x150 [ 334.412149][T16433] __x64_sys_mount+0xbe/0x150 [ 334.416873][T16433] do_syscall_64+0x103/0x610 [ 334.421492][T16433] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 334.427402][T16433] RIP: 0033:0x45ad2a [ 334.431309][T16433] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 334.450930][T16433] RSP: 002b:00007fd7659bca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 334.459370][T16433] RAX: ffffffffffffffda RBX: 00007fd7659bcb40 RCX: 000000000045ad2a [ 334.467470][T16433] RDX: 00007fd7659bcae0 RSI: 0000000020000080 RDI: 00007fd7659bcb00 [ 334.475496][T16433] RBP: 0000000000000000 R08: 00007fd7659bcb40 R09: 00007fd7659bcae0 [ 334.483489][T16433] R10: 0000000000000025 R11: 0000000000000206 R12: 0000000000000005 [ 334.491489][T16433] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:35 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x380000000) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000100)=@ipx, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000080)=""/55, 0x37}, 0x1) 20:41:35 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x0, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:35 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x4}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:35 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x6c, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 20:41:35 executing program 4: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f00000015c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000280)={0x0, 0xfb, 0xfc, 0x7, 0xc12, "7faf598a7dc4013884968ca643b81681", "0fbe8bd2d9e9b7be0ac089422b6efd3c3a17cf924b0167dfc7229f4434a0d70a19650964a02487d279a9691b4cc9abe824b386108969515ca06d39de6ec8bc83c0c8b5aec7b3e5758d648fb2487e6e928245960dc36eb3317f08ea7cea4bed38bc96fb1c0c54e11bb3dfc869cb93908a721a9624f7e1b7ab1055e51920041dae92a84d4e107972f781383e221e80d47a5009ffe0099e20f9f4519190993c653c90cd0a8c7c5406edb5e8be9f597187b6f18079b11a5a52dc7488389da24a6d5068d1d16637ff11e771ec4f16d2a2300bf4c6c772d2a54c8bfb997d42da128f4a1db0a99b3e91f8"}, 0xfc, 0x1) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000440)={0x9, 0x0, [], {0x0, @reserved}}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000300ffffffffbbaaaaaaaaaaaa00000000000000"]) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000380)={0x5, 0x0, [], {0x0, @bt={0xffffffff, 0x7, 0x1, 0x2, 0x5, 0xff, 0x71b, 0x80, 0x100000001, 0x400, 0x5, 0x100000001, 0x8, 0x81, 0x11}}}) sendto$ax25(r0, &(0x7f0000000500)="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", 0x1000, 0x40000, &(0x7f0000001500)={{0x3, @default, 0x1}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @bcast, @default, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 20:41:35 executing program 5 (fault-call:2 fault-nth:29): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) 20:41:35 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000000)={{0x5, 0x101}, 0x1}, 0x10) 20:41:35 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x0, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:35 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_i0ize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:35 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x3) [ 334.994002][T16470] FAULT_INJECTION: forcing a failure. [ 334.994002][T16470] name failslab, interval 1, probability 0, space 0, times 0 20:41:35 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x0, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 335.038413][T16470] CPU: 0 PID: 16470 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 335.046459][T16470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.056540][T16470] Call Trace: [ 335.059862][T16470] dump_stack+0x172/0x1f0 [ 335.064311][T16470] should_fail.cold+0xa/0x15 [ 335.068940][T16470] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 335.074780][T16470] ? ___might_sleep+0x163/0x280 [ 335.079660][T16470] __should_failslab+0x121/0x190 [ 335.084640][T16470] should_failslab+0x9/0x14 [ 335.089193][T16470] __kmalloc_track_caller+0x2d8/0x740 [ 335.103825][T16470] ? setup_sigcontext+0x7d0/0x7d0 [ 335.108882][T16470] ? __bad_area_nosemaphore+0xb3/0x420 [ 335.114378][T16470] ? strndup_user+0x77/0xd0 [ 335.118996][T16470] memdup_user+0x26/0xb0 [ 335.123297][T16470] strndup_user+0x77/0xd0 [ 335.127654][T16470] ksys_mount+0x3c/0x150 [ 335.132013][T16470] __x64_sys_mount+0xbe/0x150 [ 335.136732][T16470] do_syscall_64+0x103/0x610 [ 335.141351][T16470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 335.147264][T16470] RIP: 0033:0x45ad2a [ 335.151206][T16470] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 335.172353][T16470] RSP: 002b:00007fd7659bca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 335.180786][T16470] RAX: ffffffffffffffda RBX: 00007fd7659bcb40 RCX: 000000000045ad2a 20:41:35 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) [ 335.188784][T16470] RDX: 00007fd7659bcae0 RSI: 0000000020000080 RDI: 00007fd7659bcb00 [ 335.196776][T16470] RBP: 0000000000000000 R08: 00007fd7659bcb40 R09: 00007fd7659bcae0 [ 335.204797][T16470] R10: 0000000000000025 R11: 0000000000000206 R12: 0000000000000005 [ 335.212788][T16470] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:35 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x74, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 20:41:35 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400201) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:36 executing program 5 (fault-call:2 fault-nth:30): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) 20:41:36 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x0, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:36 executing program 4: syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x80000000, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:36 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_iXize'}}, {@data_err_abort='data_err=abort'}]}) [ 335.569753][T16501] FAULT_INJECTION: forcing a failure. [ 335.569753][T16501] name failslab, interval 1, probability 0, space 0, times 0 [ 335.619727][T16501] CPU: 1 PID: 16501 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 335.627824][T16501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.637978][T16501] Call Trace: [ 335.638010][T16501] dump_stack+0x172/0x1f0 [ 335.638033][T16501] should_fail.cold+0xa/0x15 [ 335.638061][T16501] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 335.645899][T16501] ? ___might_sleep+0x163/0x280 [ 335.645919][T16501] __should_failslab+0x121/0x190 [ 335.645934][T16501] should_failslab+0x9/0x14 [ 335.645950][T16501] kmem_cache_alloc_trace+0x2d1/0x760 [ 335.645969][T16501] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 335.645985][T16501] ? _copy_from_user+0xdd/0x150 [ 335.646011][T16501] copy_mount_options+0x5c/0x3a0 [ 335.692150][T16501] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 335.698442][T16501] ksys_mount+0xa7/0x150 [ 335.702726][T16501] __x64_sys_mount+0xbe/0x150 [ 335.707442][T16501] do_syscall_64+0x103/0x610 [ 335.712066][T16501] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 335.717972][T16501] RIP: 0033:0x45ad2a [ 335.721893][T16501] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 335.741513][T16501] RSP: 002b:00007fd7659bca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 335.749958][T16501] RAX: ffffffffffffffda RBX: 00007fd7659bcb40 RCX: 000000000045ad2a [ 335.757947][T16501] RDX: 00007fd7659bcae0 RSI: 0000000020000080 RDI: 00007fd7659bcb00 20:41:36 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x0, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 335.765944][T16501] RBP: 0000000000000000 R08: 00007fd7659bcb40 R09: 00007fd7659bcae0 [ 335.774024][T16501] R10: 0000000000000025 R11: 0000000000000206 R12: 0000000000000005 [ 335.782016][T16501] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:36 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x7a, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 20:41:36 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000280)='/dev/cachefiles\x00', 0x400, 0x0) getdents(r0, &(0x7f00000002c0)=""/47, 0x2f) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) fchmod(r1, 0x10) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000000), &(0x7f0000000040)=0x4) socket$nl_crypto(0x10, 0x3, 0x15) set_robust_list(&(0x7f0000000200)={&(0x7f0000000100)={&(0x7f0000000080)}, 0x80}, 0x18) 20:41:36 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:36 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:36 executing program 5 (fault-call:2 fault-nth:31): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) 20:41:36 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x0, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:36 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fcntl$getownex(r0, 0x10, &(0x7f0000000280)) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000040)='./file0\x00', 0x80000000, 0x8, &(0x7f0000000580)=[{&(0x7f0000000080)="9e527a53cbcca3a31b6b658c4c2169ab6caacfb6022886befcf03d54076857b4c96b44a8f4db31f38a19334cdeff5a1a0c5bfe19377043813b68928b23ffb3d26bdcc99216ecaa2b886e9d00f6558c4985767f300bae6685f24e8749d6d5791ae7307f81f0097c636d416fc730cf8510ca57f9f1f87d2e091d630f2914de9e31c44582c120ce31933ab39df71d4f72e5f47e31306f21f789d42935055e6c47f73b78fb073046485c61bb61a260e2170eb30787026c", 0xb5, 0x4}, {&(0x7f0000000200)="d5182c96d626e538865544c943b45e2373c4e5794e000e5515", 0x19, 0x10001}, {&(0x7f0000000280), 0x0, 0x401}, {&(0x7f00000002c0)="790757500fb91859e3c64664cb864d669230e5c608dd8d87c0a440c4ffdb8ca8a8ce9e77921b50848f4a699c5c6c8fe6d20f2f9d2d5f6831d925efe066cbc6d7412735da31a037c8fed444e0af52d6737235d43318de8811d47462cd", 0x5c, 0x401}, {&(0x7f0000000340)="e56b0e4264d4a4d4377e453c2e22578fe3426cb50ef32e999fd751e46be3c1c1a878b5dfe3127ec847c4ebfbfac6e5d45fda9b55c7e0daf474f9344aa537175a4c7231570467d0ffa632bb83d2cdcaf46100d62938682a8ae5532b6f50e4510c603455442caaac7ea472955c860abb96526820e95b637658b821a2194caf6afdd4fc8167bc54fb977499c4bb34e863ffc64f177203f4007f7ad4b85827df52e1c243d04e1bf87b020c989daad3a6b3f2a1", 0xb1, 0x80}, {&(0x7f0000000400)="d34fc884110c9d1b8a01a4c2193ff357a8f4c239a39017ff3f151d3b45f40555c09402a9e9c9c45be08e1d30ce92202174665341ca8d51ffacb945d88b935b6d10d129c7357b40ca419a19ad3ed1581f02375e4aa7db5f3620ad95df2770a1db2261a793afa4b14deed95f", 0x6b, 0x7}, {&(0x7f0000000480)="d5a937c929ff2c7e4b28bb72a379b875142e12c4d4b9f5a7b1c6fa1264b77b70b338c33a59ff449d33cdf9e6eb515e43f270cdc04aee4a5ba0b79835394bd81ebdd72d28e1da4f3d74ab2b9c8720", 0x4e}, {&(0x7f0000000500)="d878eb4154556fd5e62bbf7d5bd87edb722d46ac3f161b66a62cff6fd1e0804f39340bf134246fa0715e8c815de4b04e0a3a0bc616ffac4855f5ff65354814d4b9dfcddb9f2f981796afe201079ee624cab260278afa9f943821eba8205c1654fd798d162c", 0x65, 0x4f}], 0x1, &(0x7f0000000640)='security.selinux\x00') [ 336.149532][T16532] FAULT_INJECTION: forcing a failure. [ 336.149532][T16532] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 336.163311][T16532] CPU: 1 PID: 16532 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 336.171303][T16532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.181378][T16532] Call Trace: [ 336.184714][T16532] dump_stack+0x172/0x1f0 [ 336.189093][T16532] should_fail.cold+0xa/0x15 [ 336.193732][T16532] ? __x64_sys_mount+0xbe/0x150 [ 336.198633][T16532] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 336.204474][T16532] ? __lock_acquire+0x548/0x3fb0 [ 336.209454][T16532] should_fail_alloc_page+0x50/0x60 [ 336.214717][T16532] __alloc_pages_nodemask+0x1a1/0x7e0 [ 336.220122][T16532] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 336.225865][T16532] ? find_held_lock+0x35/0x130 [ 336.230660][T16532] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 336.236503][T16532] cache_grow_begin+0x9c/0x860 [ 336.241295][T16532] ? copy_mount_options+0x5c/0x3a0 20:41:36 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_icize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:36 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x0, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 336.246443][T16532] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 336.252726][T16532] kmem_cache_alloc_trace+0x67f/0x760 [ 336.258129][T16532] copy_mount_options+0x5c/0x3a0 [ 336.263089][T16532] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 336.269355][T16532] ksys_mount+0xa7/0x150 [ 336.273628][T16532] __x64_sys_mount+0xbe/0x150 [ 336.278339][T16532] do_syscall_64+0x103/0x610 [ 336.282953][T16532] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 336.288863][T16532] RIP: 0033:0x45ad2a [ 336.292775][T16532] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 336.312399][T16532] RSP: 002b:00007fd7659bca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 336.320835][T16532] RAX: ffffffffffffffda RBX: 00007fd7659bcb40 RCX: 000000000045ad2a [ 336.328839][T16532] RDX: 00007fd7659bcae0 RSI: 0000000020000080 RDI: 00007fd7659bcb00 [ 336.336951][T16532] RBP: 0000000000000000 R08: 00007fd7659bcb40 R09: 00007fd7659bcae0 [ 336.344942][T16532] R10: 0000000000000025 R11: 0000000000000206 R12: 0000000000000005 [ 336.352944][T16532] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:37 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x300, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 20:41:37 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x0, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:37 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000000)={0x9, 0x80000000, 0x80000001}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) 20:41:37 executing program 5 (fault-call:2 fault-nth:32): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) 20:41:37 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:37 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x0, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:37 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:37 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_idize'}}, {@data_err_abort='data_err=abort'}]}) [ 336.888707][T16557] FAULT_INJECTION: forcing a failure. [ 336.888707][T16557] name failslab, interval 1, probability 0, space 0, times 0 [ 336.934937][T16557] CPU: 0 PID: 16557 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 336.942982][T16557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.953062][T16557] Call Trace: [ 336.956395][T16557] dump_stack+0x172/0x1f0 [ 336.960753][T16557] should_fail.cold+0xa/0x15 [ 336.965371][T16557] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 336.971206][T16557] ? ___might_sleep+0x163/0x280 [ 336.976082][T16557] __should_failslab+0x121/0x190 [ 336.981035][T16557] should_failslab+0x9/0x14 [ 336.985555][T16557] kmem_cache_alloc+0x2b2/0x6f0 [ 336.990424][T16557] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 336.996082][T16557] ? find_held_lock+0x35/0x130 [ 337.000879][T16557] getname_flags+0xd6/0x5b0 [ 337.005404][T16557] user_path_at_empty+0x2f/0x50 [ 337.010365][T16557] do_mount+0x150/0x2c40 [ 337.014627][T16557] ? copy_mount_options+0x5c/0x3a0 [ 337.019760][T16557] ? copy_mount_string+0x40/0x40 [ 337.024729][T16557] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 337.031000][T16557] ? _copy_from_user+0xdd/0x150 [ 337.035880][T16557] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 337.042229][T16557] ? copy_mount_options+0x280/0x3a0 [ 337.047537][T16557] ksys_mount+0xdb/0x150 [ 337.051828][T16557] __x64_sys_mount+0xbe/0x150 [ 337.056525][T16557] do_syscall_64+0x103/0x610 [ 337.061137][T16557] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 337.067045][T16557] RIP: 0033:0x45ad2a [ 337.070956][T16557] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 337.090664][T16557] RSP: 002b:00007fd7659bca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 337.099115][T16557] RAX: ffffffffffffffda RBX: 00007fd7659bcb40 RCX: 000000000045ad2a [ 337.107278][T16557] RDX: 00007fd7659bcae0 RSI: 0000000020000080 RDI: 00007fd7659bcb00 [ 337.115267][T16557] RBP: 0000000000000000 R08: 00007fd7659bcb40 R09: 00007fd7659bcae0 [ 337.123265][T16557] R10: 0000000000000025 R11: 0000000000000206 R12: 0000000000000005 20:41:37 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = fcntl$getown(r1, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000007c0)={{{@in6=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6}}, &(0x7f00000008c0)=0xe8) r5 = getgid() r6 = getpgrp(0xffffffffffffffff) lstat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000009c0)={0x0, 0x0, 0x0}, &(0x7f0000000a00)=0xc) sendmsg$unix(r0, &(0x7f0000000ac0)={&(0x7f0000000000)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000000700)=[{&(0x7f0000000280)="a23165318d8d664900b103b6a3584fce50370d8a3044017f98d6a096ba3250f3737361731bd1c983cb31c6002e40cc1b48c9690a31d1f794b625f10dca32ad7c3ebc4e2129ffcc39c5418125626d731bbf09c2cce0ae70d26945e5a34e66b67394a41fdeb27b0a21cb9b7cf5a23a3052f7e7bab9b0fc916b0472e2a5316fb522226f3859f455d40b2022666c6f7c8216ab0b303fddb1546ff802707e6d05b2b52d1da3ab266e227196f253c07efb9f2c30dc7db511c9c4c7fc6d2f92c82fa7f31ca07205f489097965f4c26cf9e4a65c2640e9c01cb0db7a", 0xd8}, {&(0x7f0000000080)="ed70444497d265966afebbff4e3e2dd7adab44d94ec0337c5ae915b57fc387bb8d7fa7174750471dfaeae8c4c8cb4adfc715d8889848430c8892352016edb1fef28f0336f9ff125da3d806ee3948c2d6cd15055b0b6617ec1ae830ffdb489febbba7df07c62ead81e47b", 0x6a}, {&(0x7f0000000380)="cf102435aafe00a6632a0dad651c709afa0f30cb8002240b50f8559bea9e869efb4b2034e0c312e1101cc4f6e05071dc0d3074f4e0e48f86c1cdcee5792d586aeadfe510ecdeaecb3e881565586327b48c6f5b9b7760b1a7864c7c8ecc5e0e3920470caa8a331bb262757298ab8ca36a856bab338e5a9bcec547732d9712d062ae2038e1f3f0baa193b0d993f19caa6690baf13bf9101037b8aec573363ac71ca7bca454a7aa6f55a1e0e131e7bc5f50d2e4d7ba21abee7c60a1", 0xba}, {&(0x7f0000000440)="9f068593cc4e46735a85c462ad47e4cbc1bda08bf82ea5322c0ac42c48cbbaba237ae124fa94240558437b6ef6aac4615cb6ca1049b4d4ced832331ab02fd808327846cc95857a25b15ef6c426610b5e9cd4f463767867df1cd6a2d7c85b9b3acb66704bfdc6d324d0d175435e8386e0ec1d1f749be2da6730b68554728fe0c7a9d43c0ed430a235ac00d84f2bd8ffb670c20e8fdcedb042995a", 0x9a}, {&(0x7f0000000500)="a93f65259cedf60d95be08eb7c70b149185d3d3c31777f06ea5b1040a7b05682532413b5ad6e0601604e6dbfac93b680002329297ed4d591c66950a813dc11cc0acde8c6a7ca89f72761b87b27bc42e8eda2248baac01f173b115a59609c72448c089f092df54225a556b6c0d81f59dd5606455e6702f3c25f17761b4ea164d4b33b6dd53b23954e642889d988", 0x8d}, {&(0x7f0000000100)="09e86a969d88678fe705684aef16e00561a98060abf5", 0x16}, {&(0x7f00000005c0)="5f19a827f266960a18eebeb23cce882304213cf9ae3de1204bf32264a03e423d8d3f68b41fe5e451eed05ae153224af055d75ac9d087a0015b8dce2566e14a69f8e0c23c1d9d418c7811c7851cdcf98fd8813c722e85d10f53e4c02b911eb41297ae4340be17963a0e5bd5bf97fd26d916c12df7cc6907e503fbc3da2cc39f3acb1e2322b7cc1b7834758592bb9e7af64133fd456e6184667951819368b4bba1b248ff74516426316230107a333ae5929ec26923ae09bf77b90132c5ca072cc2c544750cc311e5dc37954374b361ee5933b0518f9e66cd0bee1816c115232ba4520730bce1523e67a5d8183bcbde868a5d389a1041decb", 0xf7}, {&(0x7f0000000200)="32b344450be48eb0d89f91f6c1374866dfb07dd9cea2190b082488935c13a4b8f444", 0x22}, {&(0x7f00000006c0)="ce965fa7005b5c85c6eb0db1c3f0996ce870b94a2de168b19f0b114b", 0x1c}], 0x9, &(0x7f0000000a40)=[@cred={0x20, 0x1, 0x2, r3, r4, r5}, @rights={0x20, 0x1, 0x1, [r2, r2, r1]}, @cred={0x20, 0x1, 0x2, r6, r7, r8}], 0x60, 0x4000084}, 0x4000000) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) [ 337.131249][T16557] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:37 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x500, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 20:41:37 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x0, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:37 executing program 5 (fault-call:2 fault-nth:33): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) [ 337.279326][T16573] EXT4-fs: 27 callbacks suppressed [ 337.279348][T16573] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_idize=0x0000000000000000" or missing value 20:41:37 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) connect$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x3, @multicast1}}, 0x1e) [ 337.384247][T16578] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 337.404735][T16581] EXT4-fs (sda1): Unrecognized mount option "fowner>00000000000000000000" or missing value 20:41:38 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x1e3ebc6d, 0x0, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:38 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r0, 0x4010641a, &(0x7f0000000040)={0xa, &(0x7f0000000000)=[0x0, 0x18, 0x1, 0x9ec4, 0x9, 0x0, 0x101, 0x2, 0xab9, 0x100000000]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000000080), &(0x7f00000000c0)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)=0x0) getresuid(&(0x7f0000000440), &(0x7f0000000480)=0x0, &(0x7f00000004c0)) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000005c0)=0x0) getresuid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0, 0x0}, &(0x7f0000000700)=0xc) r9 = getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@initdev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000000b40)=0xe8) r11 = getgid() r12 = getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000b80)={{{@in6=@remote, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f0000000c80)=0xe8) lstat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = getpid() r16 = geteuid() r17 = getegid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000d80)=0x0) lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0}) r20 = getegid() r21 = getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000015c0)={{{@in, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f00000016c0)=0xe8) lstat(&(0x7f0000001700)='./file0\x00', &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r1, &(0x7f0000001880)=[{&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000280)="5dc7dbdad46695f0838e70197532cf90545af3d145245b5969a4cbfdd86102cfbc1568558519d158af632adb2c481b94157fc399319e596538f246b8b6d40d0764659f9a1fa89f6760625b66a98c69de15a4af", 0x53}, {&(0x7f0000000080)="19278c610393191bc16c4865fa981ae665c7810b44dbdd251877d15f6de30cbda5f628a3f37ebf997e7680fe50f5ab0370c438ca46ca85e041", 0x39}, {&(0x7f0000000100)}, {&(0x7f0000000340)="9cddf46f6c70f4e0bf3c60e6b31daa55a4aaacfc0e6012a1866edf9197fafe1e4661b3f4d486f7b3ba5f1ac54736e2fcb2d5aa69828d4b71d87b6fc5351a63adbb3a756e8f9ba298", 0x48}], 0x4, &(0x7f0000000740)=[@rights={0x20, 0x1, 0x1, [r2, r1, r2]}, @rights={0x20, 0x1, 0x1, [r1, r2, r2]}, @cred={0x20, 0x1, 0x2, r3, r4, r5}, @cred={0x20, 0x1, 0x2, r6, r7, r8}], 0x80}, {&(0x7f00000007c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000a00)=[{&(0x7f0000000840)}, {&(0x7f0000000880)="696f6c5b8ebf14d24b7f9815b617000dd4327f9997b64242177c2293a4ac46f448ed9e0da4e876c58df583b253fabd9217ccf86abc353069a215325a2027145daeb97b9f9fcc4f7aff77c839208d1f12d6f0a399cd647f4fa2ca5447ce453fbd2ce981e06c4a7e5a77470a5e57f4ed4ef02ee887d106822f567da18ad668ec86f14c4dda561aeb01a3a7a3cb40fcf81fc3a5318fafa1f43ca6ef13595cdc04f9a2b755823c3df8aee91f192fc1d7b8c70c352d64aeae266b", 0xb8}, {&(0x7f0000000940)="2f284f99ccb8ac7d24f105aa424ac1d69a68849184199be56783e6821c597fbff4cfac392bed1d7385550ffab613218855ad83f0f42cff2121b9427e16a7862121b05999db9cbb661ce424523a27536498be69d74ef1496870b87b96fadb9edd5ff190ec67a3c4b50e0ab12c7511a8d07d8676f16b50a25642d8a1c0d8c85cb1991ba980d6646f", 0x87}], 0x3, &(0x7f0000000e80)=[@rights={0x28, 0x1, 0x1, [r0, r1, r1, r1, r1]}, @cred={0x20, 0x1, 0x2, r9, r10, r11}, @rights={0x20, 0x1, 0x1, [r2, r2, r2]}, @rights={0x20, 0x1, 0x1, [r1, r0, r1]}, @cred={0x20, 0x1, 0x2, r12, r13, r14}, @cred={0x20, 0x1, 0x2, r15, r16, r17}, @cred={0x20, 0x1, 0x2, r18, r19, r20}, @rights={0x18, 0x1, 0x1, [r0]}], 0x100}, {&(0x7f0000000f80)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000001540)=[{&(0x7f0000001000)="505f1d9c088d4c4cc2385aa57bb7c330d1e4dc153a5fd35d484c9a95445c97c37cecc846ab1c2a984f314ee909727b1299d936812fe939572de0b594f900908db592fd1470e630a74af628a14e553ea44b156874fd3a6efb9e509e6387f3d9f27ae36576e17773c221236f802dfa2acea2201c9245d9c981fa31d8e8bc37762488db1385a53e9be46675611acb5bc4f18f9f96e36a1682269fad226d29fc1686bd7b286f280c172263a78613bd1c50", 0xaf}, {&(0x7f00000010c0)="53482f3b487eeb3221ab6155c9c9a0d3a46a58386c528a5877930c718b94fff5a85dc039ba1d8c5a40034246f1a62a7c98e68716ac5e2c7b46f76c96e95c0c4430c71ac96943ea8b", 0x48}, {&(0x7f0000001140)="e90afe4bab22a0d1", 0x8}, {&(0x7f0000001180)="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", 0xfc}, {&(0x7f0000001280)="f8cbc887292f2fbe895be6be1a4ff7b50292d27dd9f95dd292dad535db4aa01ec611b32c61c9a44efe00bf783e2ad2b359f8aa171c73545440470b71577b4a81fa07389c8e9f28e7279dd54dde38875d7c8a00a387044ca30703ccd9f037e4ac9d950011929aa8fd3dca07827178a1f45e58509ab1de1f9daaed0e252840095015965a729d9a78d68ee0a300aff75c8a6d4dfc4438e22a76611aca6ec8812b3ef4e2af5f078ffa307fa2b6b636ecfbe58b36347f91abde7eef7e235e0ebd9d44e0f1a5d5", 0xc4}, {&(0x7f0000001380)="0fe2f9fd6bbc04cd5dfd2a9525f44d5593ea5e5d0572d9acd918b9081a06b657619b470f73cf16d0f5ad1bf8aa7707c6ababb59ce8a59db71e2380ccb429301c2018b1ca7d16884441b02bec74e87ff8f85e5cff501752bc49405b0965894a85f1d2878233f61504beaa2151b76ea7bb4a797b99a5ff55d731dfd43ea283b35db1618578d28c20e58e6c855aeca578aa2632d3c076", 0x95}, {&(0x7f0000001440)="83093870c9e2a1abdc727092ac4db18c3c2e8d32096534be9aac97de0be645a42dfe23c9dc36a07c0122fd733eef65e14d844a2f2b4329294d68e7aea92e180d83ff0eb307e92c99ce259f017506295c87e55ffa9243d4fbdf5cecdace84cd02079b90a3", 0x64}, {&(0x7f00000014c0)="d8dfc3cefb473ec68302516a85cdd2065b9c7c62790a8eee453aa4ad6a78bfddfadd6043b6f8010a839860d57242d692eae4afdd81c101b903b78bc925b1af037d616a92e1e212275b86547895381f6a6ff500f128f582f28b3efeed64035357e17b42df299b610c0400f040", 0x6c}], 0x8, &(0x7f00000017c0)=[@cred={0x20, 0x1, 0x2, r21, r22, r23}, @rights={0x28, 0x1, 0x1, [r1, r2, r0, r2, r1]}, @rights={0x38, 0x1, 0x1, [r0, r1, r1, r0, r1, r0, r1, r2, r2]}, @rights={0x20, 0x1, 0x1, [r2, r0, r1]}], 0xa0, 0x4}], 0x3, 0x80) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:38 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x9}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) [ 337.493378][T16592] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_idize=0x0000000000000000" or missing value 20:41:38 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x600, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 337.562462][T16587] FAULT_INJECTION: forcing a failure. [ 337.562462][T16587] name failslab, interval 1, probability 0, space 0, times 0 [ 337.583089][T16587] CPU: 1 PID: 16587 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 337.591133][T16587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.601385][T16587] Call Trace: [ 337.604714][T16587] dump_stack+0x172/0x1f0 [ 337.609072][T16587] should_fail.cold+0xa/0x15 [ 337.613725][T16587] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 337.619553][T16587] ? ___might_sleep+0x163/0x280 [ 337.624431][T16587] __should_failslab+0x121/0x190 [ 337.629403][T16587] should_failslab+0x9/0x14 [ 337.633932][T16587] kmem_cache_alloc_trace+0x2d1/0x760 [ 337.639335][T16587] kobject_uevent_env+0x2fb/0x1030 [ 337.644482][T16587] kobject_uevent+0x20/0x26 [ 337.649008][T16587] __loop_clr_fd+0x4ee/0xd60 [ 337.653635][T16587] lo_ioctl+0x210/0x2150 [ 337.657904][T16587] ? tomoyo_domain+0xc5/0x160 [ 337.662626][T16587] ? lo_rw_aio+0x1120/0x1120 [ 337.667239][T16587] blkdev_ioctl+0x6f2/0x1d10 [ 337.671855][T16587] ? blkpg_ioctl+0xa90/0xa90 [ 337.676481][T16587] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 337.682316][T16587] ? __fget+0x35a/0x550 [ 337.686497][T16587] block_ioctl+0xee/0x130 [ 337.690930][T16587] ? blkdev_fallocate+0x410/0x410 [ 337.695976][T16587] do_vfs_ioctl+0xd6e/0x1390 [ 337.700693][T16587] ? ioctl_preallocate+0x210/0x210 [ 337.705831][T16587] ? __fget+0x381/0x550 [ 337.710036][T16587] ? ksys_dup3+0x3e0/0x3e0 [ 337.714471][T16587] ? kfree+0x173/0x230 [ 337.718564][T16587] ? kfree+0x173/0x230 [ 337.722685][T16587] ? tomoyo_file_ioctl+0x23/0x30 [ 337.727640][T16587] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 337.733915][T16587] ? security_file_ioctl+0x93/0xc0 [ 337.739048][T16587] ksys_ioctl+0xab/0xd0 [ 337.743233][T16587] __x64_sys_ioctl+0x73/0xb0 [ 337.747848][T16587] do_syscall_64+0x103/0x610 [ 337.752464][T16587] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 337.758385][T16587] RIP: 0033:0x458127 [ 337.762294][T16587] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 337.781915][T16587] RSP: 002b:00007fd7659bca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 337.790352][T16587] RAX: ffffffffffffffda RBX: 00007fd7659bcb40 RCX: 0000000000458127 [ 337.798343][T16587] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000006 20:41:38 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x0, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 337.806337][T16587] RBP: 0000000000000000 R08: 00007fd7659bcb40 R09: 00007fd7659bcae0 [ 337.814335][T16587] R10: 0000000000000025 R11: 0000000000000246 R12: 0000000000000005 [ 337.822329][T16587] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:38 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14, 0x80800) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000080)={@remote, @local, r1}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400203) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:38 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_iiize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:38 executing program 5 (fault-call:2 fault-nth:34): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) 20:41:38 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000)=0x1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) [ 337.994684][T16602] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 20:41:38 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x0, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 338.067601][T16613] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iiize=0x0000000000000000" or missing value 20:41:38 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) [ 338.147379][T16616] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 338.170834][T16611] EXT4-fs (sda1): Unrecognized mount option "fowner>00000000000000000000" or missing value 20:41:38 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x700, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 20:41:38 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0xe184, 0x0, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 338.222318][T16614] FAULT_INJECTION: forcing a failure. [ 338.222318][T16614] name failslab, interval 1, probability 0, space 0, times 0 [ 338.238853][T16614] CPU: 1 PID: 16614 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 338.246895][T16614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.256975][T16614] Call Trace: [ 338.260296][T16614] dump_stack+0x172/0x1f0 [ 338.264653][T16614] should_fail.cold+0xa/0x15 [ 338.269274][T16614] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 338.275106][T16614] ? ___might_sleep+0x163/0x280 [ 338.279980][T16614] __should_failslab+0x121/0x190 [ 338.284938][T16614] should_failslab+0x9/0x14 [ 338.289459][T16614] kmem_cache_alloc_trace+0x2d1/0x760 [ 338.294893][T16614] kobject_uevent_env+0x2fb/0x1030 [ 338.300291][T16614] kobject_uevent+0x20/0x26 [ 338.304809][T16614] __loop_clr_fd+0x4ee/0xd60 [ 338.309418][T16614] lo_ioctl+0x210/0x2150 [ 338.313701][T16614] ? tomoyo_domain+0xc5/0x160 [ 338.318396][T16614] ? lo_rw_aio+0x1120/0x1120 [ 338.323005][T16614] blkdev_ioctl+0x6f2/0x1d10 [ 338.327625][T16614] ? blkpg_ioctl+0xa90/0xa90 [ 338.332228][T16614] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 338.338069][T16614] ? __fget+0x35a/0x550 [ 338.342284][T16614] block_ioctl+0xee/0x130 [ 338.346634][T16614] ? blkdev_fallocate+0x410/0x410 [ 338.351703][T16614] do_vfs_ioctl+0xd6e/0x1390 [ 338.356313][T16614] ? ioctl_preallocate+0x210/0x210 [ 338.361444][T16614] ? __fget+0x381/0x550 [ 338.365630][T16614] ? ksys_dup3+0x3e0/0x3e0 [ 338.370078][T16614] ? kfree+0x173/0x230 [ 338.374263][T16614] ? kfree+0x173/0x230 [ 338.378367][T16614] ? tomoyo_file_ioctl+0x23/0x30 [ 338.383326][T16614] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 338.389602][T16614] ? security_file_ioctl+0x93/0xc0 [ 338.394746][T16614] ksys_ioctl+0xab/0xd0 [ 338.398932][T16614] __x64_sys_ioctl+0x73/0xb0 [ 338.403642][T16614] do_syscall_64+0x103/0x610 [ 338.408272][T16614] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 338.414183][T16614] RIP: 0033:0x458127 [ 338.418103][T16614] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 338.437815][T16614] RSP: 002b:00007fd7659bca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 338.446249][T16614] RAX: ffffffffffffffda RBX: 00007fd7659bcb40 RCX: 0000000000458127 [ 338.454340][T16614] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000006 [ 338.462420][T16614] RBP: 0000000000000000 R08: 00007fd7659bcb40 R09: 00007fd7659bcae0 20:41:39 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_ilize'}}, {@data_err_abort='data_err=abort'}]}) [ 338.470516][T16614] R10: 0000000000000025 R11: 0000000000000246 R12: 0000000000000005 [ 338.478611][T16614] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 [ 338.625969][T16631] EXT4-fs (sda1): Unrecognized mount option "fowner>00000000000000000000" or missing value 20:41:39 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:39 executing program 4: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000340)={0x0, @bt={0x7, 0xffffffffffff43d9, 0x1, 0x0, 0x7f, 0x8, 0x1, 0x100, 0x10001, 0x200, 0x100000000, 0x4, 0x5de4d87c, 0x800, 0x2, 0x2}}) r1 = perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x42d, 0x101, 0x400, 0x7fff, 0x0, 0x2, 0x10, 0xc, 0xd, 0xffffffffffffff6f, 0x0, 0x2, 0x2, 0x7, 0x5, 0x4, 0x80000000, 0x13b, 0x94, 0x1f, 0x1, 0x81, 0x3, 0x1, 0x7fff, 0x3, 0x4, 0x7f, 0x1, 0x1ff, 0x2, 0x6, 0xfffffffffffff001, 0x5, 0xfa4d, 0x2a8a, 0x0, 0xc37, 0x1, @perf_bp={&(0x7f0000000200)}, 0x400, 0x6, 0xff, 0x6, 0x3000000000, 0x20f, 0x3}, 0xffffffffffffffff, 0x4, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000300)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000000)={0x100, 0x1, 0xbc, 0x0, 0x0, [], [], [], 0x6, 0x2}) 20:41:39 executing program 5 (fault-call:2 fault-nth:35): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) [ 338.702961][T16633] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ilize=0x0000000000000000" or missing value 20:41:39 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0x0, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:39 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000200)=0xe8) syz_mount_image$erofs(&(0x7f0000000500)='erofs\x00', &(0x7f0000000800)='./file0\x00', 0x0, 0x1, &(0x7f0000000880)=[{&(0x7f0000000840)="0d157f5d18bab58ec5c558fc4c6ea5b7ba19e77d77c20eb8812c125b36ca98ee7654f2eae5bd11ba35ae5e7fefb0bbef87a30d864a7f41c767424daa4011c1f4", 0x40, 0x5}], 0x1000, &(0x7f00000009c0)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}], [{@smackfsdef={'smackfsdef', 0x3d, '*trusted%ppp0GPL'}}]}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000700)={@in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x22}, 0x4}, {&(0x7f00000005c0)=""/28, 0x1c}, &(0x7f00000006c0), 0x1}, 0xa0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000380)={{{@in=@dev, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000000480)=0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="ffff3fff03ffffff0000000003000000e0040001ac1c14bbac1414bb"], 0x1c) syz_extract_tcp_res$synack(&(0x7f0000000540), 0x1, 0x0) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r1, r2, r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffff12e, 0xa, 0x9, 0x1, "6f8ba4b98879c9ba466b6c01c19b5a871a5b8837f92a5b136cfcf6a7158050c0069622878ea8fb82095b54eafaa436680e95b615167e0f0d8d3f28fa224e6def", "21942ce1ac358b54c5a9d6f66f553ceda17037465d14227d6b10f38981bb51d1", [0xb6, 0x1f]}) umount2(&(0x7f00000007c0)='./file0\x00', 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f0000000000)={{0xf001, 0x100000, 0x0, 0x1, 0x8, 0x1, 0x2, 0x3, 0x0, 0x8, 0x4, 0x1}, {0x5000, 0x0, 0xc, 0x9, 0x1, 0x5, 0x7, 0x1, 0x325, 0x9, 0x8, 0xfffffffffffffc00}, {0x4000, 0x4000, 0xe, 0x2, 0x9, 0x1f, 0xb8, 0x3bcb, 0x7fffffff, 0x8, 0x80000000, 0x400}, {0x3000, 0xf000, 0x8, 0x0, 0x6, 0x4f25, 0x3, 0x96c9, 0x1, 0x8001, 0x1, 0x100000000}, {0x6000, 0x5002, 0x1e, 0x1, 0x7f, 0x1ff, 0x100000001, 0x5, 0x1, 0x652265a0, 0x18b0, 0x3f}, {0x2000, 0x0, 0x0, 0x4, 0x2, 0x1, 0x0, 0x1000000000000000, 0x7, 0xfffffffffffffc00, 0x0, 0x20}, {0x1, 0x0, 0xc, 0x50f3, 0x80000000, 0x3, 0x9, 0x1, 0x1, 0x1000, 0x6, 0x400}, {0x1, 0xf000, 0xf, 0xfffffffffffffffa, 0x3ff, 0x80, 0xfffffffffffffffa, 0x8, 0x0, 0x6, 0x80000000, 0xfffffffffffff472}, {0xf000, 0x5005}, {0x5000, 0x1}, 0x20010000, 0x0, 0x4000, 0x110080, 0xd, 0x100, 0x2, [0x8, 0x3, 0x100000001, 0x1]}) r5 = getpgid(0xffffffffffffffff) rt_sigqueueinfo(r5, 0xd, &(0x7f0000000a40)={0x35, 0x527, 0x7ff}) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f00000004c0)={0x9, 0x101}) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:39 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0x0, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 338.928597][T16643] FAULT_INJECTION: forcing a failure. [ 338.928597][T16643] name failslab, interval 1, probability 0, space 0, times 0 [ 338.953588][T16643] CPU: 0 PID: 16643 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 338.961642][T16643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.961650][T16643] Call Trace: [ 338.961690][T16643] dump_stack+0x172/0x1f0 [ 338.961715][T16643] should_fail.cold+0xa/0x15 [ 338.984260][T16643] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 338.984281][T16643] ? ___might_sleep+0x163/0x280 [ 338.984301][T16643] __should_failslab+0x121/0x190 [ 338.984317][T16643] should_failslab+0x9/0x14 [ 338.984332][T16643] kmem_cache_alloc_trace+0x2d1/0x760 [ 338.984346][T16643] ? apparmor_capable+0x2ed/0x630 [ 338.984359][T16643] ? cap_capable+0x205/0x270 [ 338.984378][T16643] alloc_fs_context+0x5a/0x640 [ 338.984395][T16643] fs_context_for_reconfigure+0x73/0x90 [ 338.984415][T16643] do_mount+0x8ba/0x2c40 [ 338.995119][T16643] ? copy_mount_string+0x40/0x40 [ 338.995142][T16643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 338.995155][T16643] ? copy_mount_options+0x280/0x3a0 [ 338.995172][T16643] ksys_mount+0xdb/0x150 [ 338.995189][T16643] __x64_sys_mount+0xbe/0x150 [ 338.995207][T16643] do_syscall_64+0x103/0x610 [ 338.995224][T16643] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 338.995236][T16643] RIP: 0033:0x45ad2a 20:41:39 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x900, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 338.995251][T16643] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 338.995258][T16643] RSP: 002b:00007fd7659bca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 338.995272][T16643] RAX: ffffffffffffffda RBX: 00007fd7659bcb40 RCX: 000000000045ad2a [ 338.995281][T16643] RDX: 00007fd7659bcae0 RSI: 0000000020000080 RDI: 00007fd7659bcb00 [ 338.995290][T16643] RBP: 0000000000000000 R08: 00007fd7659bcb40 R09: 00007fd7659bcae0 [ 338.995299][T16643] R10: 0000000000000025 R11: 0000000000000206 R12: 0000000000000005 [ 338.995307][T16643] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:39 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x7ff, 0x0, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:39 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_ioize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:39 executing program 5 (fault-call:2 fault-nth:36): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) 20:41:40 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='security.selinux\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) linkat(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x1000) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='security.selinux\x00', 0x0, 0x0, 0x2) syz_mount_image$nfs(&(0x7f00000000c0)='nfs\x00', &(0x7f0000000100)='./file0\x00', 0x7fff, 0x3, &(0x7f0000000480)=[{&(0x7f0000000280)="fb384b4a452406cb598c7e85be7e6e626e6be1441d4b55e27b4f07b5bb2338f5b31445f5fd2429acbefcac66dffc38717922cad9d755ed946270da15984cc3eb7ce5ffc4406e30d2497f5953b912ba6bd3c7b2cbc9f8acef8d7ed734e394f849837617fbfcb538d1d8f30c145773ba656ad24138873bc1064778c361fdbe9cdabc5a0d6a51400f35ea7f160a4a73417d7d3475155a6d7668894e0b40c6a56b0ed7956c2cc994c8e0338528f753a437dc9f503abc31f5a870c81f82874e98b196", 0xc0}, {&(0x7f0000000340)="44725c1d4267b21be5c94543004f3c009e1f7e791ae8de168133bfc8e488e91c6096d06f08881d403364cbc33c8b2a6387aada1a5816f02c702cfa81b5a92a763a2a46434cb3312f67b08c49597cb49b82475b2c65b6b945357ed91a76b02c8f866f99f1e8eed513aaa7ce4298e6117715b3e115deaf1f61bb161e71e909e33c1064a540991f998dd001fb43187ff5fdf598a27ca5c15fca7484ba452a8d", 0x9e, 0x3f}, {&(0x7f0000000400)="836f9e7661fdb90d706e803772fbc51262420878588cb7c903294894220372bfb38ea8898d85d7b5efaa607299a242f9967d3cbd4aae822239042bd740a1cbf8c57d099ad988330bd1f6e835f88f1d2f42ea645e2b3a06a0cc948f7193c75b6e0da1375b7ca9ea802ac2d245ae6628d1c45364378a3026f7c0b887", 0x7b, 0x8735}], 0x1000000, &(0x7f0000000200)='{GPL\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000600)={r0, &(0x7f0000000500)="00ad8d209b24055d7d47966aca3dbe223be7512e45cb92d09a17c82a7678378c62a6c08fb12c472954", &(0x7f0000000540)=""/144}, 0x18) 20:41:40 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x0, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:40 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x10}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) [ 339.472490][T16676] FAULT_INJECTION: forcing a failure. [ 339.472490][T16676] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 339.486102][T16676] CPU: 0 PID: 16676 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 339.494117][T16676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.504193][T16676] Call Trace: [ 339.507512][T16676] dump_stack+0x172/0x1f0 [ 339.511877][T16676] should_fail.cold+0xa/0x15 [ 339.516491][T16676] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 339.522313][T16676] ? __lock_acquire+0x548/0x3fb0 [ 339.527263][T16676] ? trace_hardirqs_on+0x67/0x230 [ 339.532307][T16676] should_fail_alloc_page+0x50/0x60 [ 339.537555][T16676] __alloc_pages_nodemask+0x1a1/0x7e0 [ 339.542954][T16676] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 339.548700][T16676] ? find_held_lock+0x35/0x130 [ 339.553503][T16676] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 339.559337][T16676] cache_grow_begin+0x9c/0x860 [ 339.564124][T16676] ? kobject_uevent_env+0x2fb/0x1030 [ 339.569431][T16676] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 339.575707][T16676] kmem_cache_alloc_trace+0x67f/0x760 [ 339.581118][T16676] kobject_uevent_env+0x2fb/0x1030 [ 339.586284][T16676] kobject_uevent+0x20/0x26 [ 339.590841][T16676] __loop_clr_fd+0x4ee/0xd60 [ 339.595462][T16676] lo_ioctl+0x210/0x2150 [ 339.599719][T16676] ? tomoyo_domain+0xc5/0x160 [ 339.604424][T16676] ? lo_rw_aio+0x1120/0x1120 [ 339.609128][T16676] blkdev_ioctl+0x6f2/0x1d10 [ 339.613739][T16676] ? blkpg_ioctl+0xa90/0xa90 [ 339.618349][T16676] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 339.624181][T16676] ? __fget+0x35a/0x550 [ 339.628361][T16676] block_ioctl+0xee/0x130 [ 339.632717][T16676] ? blkdev_fallocate+0x410/0x410 [ 339.637761][T16676] do_vfs_ioctl+0xd6e/0x1390 [ 339.642376][T16676] ? ioctl_preallocate+0x210/0x210 [ 339.647521][T16676] ? __fget+0x381/0x550 [ 339.651719][T16676] ? ksys_dup3+0x3e0/0x3e0 [ 339.656156][T16676] ? kfree+0x173/0x230 [ 339.660239][T16676] ? kfree+0x173/0x230 [ 339.664334][T16676] ? tomoyo_file_ioctl+0x23/0x30 [ 339.669286][T16676] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 339.675552][T16676] ? security_file_ioctl+0x93/0xc0 [ 339.680692][T16676] ksys_ioctl+0xab/0xd0 [ 339.684868][T16676] __x64_sys_ioctl+0x73/0xb0 [ 339.689478][T16676] do_syscall_64+0x103/0x610 [ 339.694095][T16676] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 339.700003][T16676] RIP: 0033:0x458127 [ 339.703910][T16676] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 339.723530][T16676] RSP: 002b:00007fd7659bca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 339.731960][T16676] RAX: ffffffffffffffda RBX: 00007fd7659bcb40 RCX: 0000000000458127 [ 339.739955][T16676] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000006 [ 339.748030][T16676] RBP: 0000000000000000 R08: 00007fd7659bcb40 R09: 00007fd7659bcae0 [ 339.756894][T16676] R10: 0000000000000025 R11: 0000000000000246 R12: 0000000000000005 [ 339.764882][T16676] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:40 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xf23, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 20:41:40 executing program 5 (fault-call:2 fault-nth:37): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) 20:41:40 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_ipize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:40 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x0, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:40 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000000000)=""/9, &(0x7f0000000040)=0x9) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:40 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2d}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:40 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x4, 0x0, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 340.342451][T16695] FAULT_INJECTION: forcing a failure. [ 340.342451][T16695] name failslab, interval 1, probability 0, space 0, times 0 [ 340.375521][T16695] CPU: 0 PID: 16695 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 340.383560][T16695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 340.394141][T16695] Call Trace: [ 340.397450][T16695] dump_stack+0x172/0x1f0 [ 340.401828][T16695] should_fail.cold+0xa/0x15 [ 340.406453][T16695] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 340.412282][T16695] ? ___might_sleep+0x163/0x280 [ 340.417154][T16695] __should_failslab+0x121/0x190 [ 340.422114][T16695] should_failslab+0x9/0x14 [ 340.426630][T16695] kmem_cache_alloc_node+0x264/0x710 [ 340.431932][T16695] ? find_held_lock+0x35/0x130 [ 340.436904][T16695] __alloc_skb+0xd5/0x5e0 [ 340.441270][T16695] ? skb_trim+0x190/0x190 [ 340.445638][T16695] ? kasan_check_read+0x11/0x20 [ 340.450519][T16695] alloc_uevent_skb+0x83/0x1e2 [ 340.455314][T16695] kobject_uevent_env+0xa63/0x1030 [ 340.460458][T16695] kobject_uevent+0x20/0x26 [ 340.464982][T16695] __loop_clr_fd+0x4ee/0xd60 [ 340.469601][T16695] lo_ioctl+0x210/0x2150 [ 340.473862][T16695] ? tomoyo_domain+0xc5/0x160 [ 340.478556][T16695] ? lo_rw_aio+0x1120/0x1120 [ 340.483174][T16695] blkdev_ioctl+0x6f2/0x1d10 [ 340.487790][T16695] ? blkpg_ioctl+0xa90/0xa90 [ 340.492409][T16695] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 340.498251][T16695] ? __fget+0x35a/0x550 [ 340.502436][T16695] block_ioctl+0xee/0x130 [ 340.506787][T16695] ? blkdev_fallocate+0x410/0x410 [ 340.511833][T16695] do_vfs_ioctl+0xd6e/0x1390 [ 340.516438][T16695] ? ioctl_preallocate+0x210/0x210 [ 340.521560][T16695] ? __fget+0x381/0x550 [ 340.525760][T16695] ? ksys_dup3+0x3e0/0x3e0 [ 340.530191][T16695] ? kfree+0x173/0x230 [ 340.534275][T16695] ? kfree+0x173/0x230 [ 340.538363][T16695] ? tomoyo_file_ioctl+0x23/0x30 [ 340.543313][T16695] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 340.549573][T16695] ? security_file_ioctl+0x93/0xc0 [ 340.554717][T16695] ksys_ioctl+0xab/0xd0 [ 340.558893][T16695] __x64_sys_ioctl+0x73/0xb0 [ 340.563503][T16695] do_syscall_64+0x103/0x610 [ 340.568127][T16695] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 340.574032][T16695] RIP: 0033:0x458127 [ 340.577937][T16695] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 340.597810][T16695] RSP: 002b:00007fd7659bca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 340.606265][T16695] RAX: ffffffffffffffda RBX: 00007fd7659bcb40 RCX: 0000000000458127 [ 340.614250][T16695] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000006 [ 340.622320][T16695] RBP: 0000000000000000 R08: 00007fd7659bcb40 R09: 00007fd7659bcae0 [ 340.630310][T16695] R10: 0000000000000025 R11: 0000000000000246 R12: 0000000000000005 20:41:41 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x1f00, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 340.638317][T16695] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:41 executing program 5 (fault-call:2 fault-nth:38): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) 20:41:41 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9, 0x42) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000040)=0x3) creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:41 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x0, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:41 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_iuize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:41 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 20:41:41 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) [ 340.962655][T16721] FAULT_INJECTION: forcing a failure. [ 340.962655][T16721] name failslab, interval 1, probability 0, space 0, times 0 [ 340.989856][T16721] CPU: 0 PID: 16721 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 340.997899][T16721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.007983][T16721] Call Trace: [ 341.011329][T16721] dump_stack+0x172/0x1f0 [ 341.015782][T16721] should_fail.cold+0xa/0x15 [ 341.020412][T16721] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 341.026260][T16721] ? ___might_sleep+0x163/0x280 [ 341.031157][T16721] __should_failslab+0x121/0x190 [ 341.036991][T16721] should_failslab+0x9/0x14 [ 341.041518][T16721] kmem_cache_alloc+0x2b2/0x6f0 [ 341.046418][T16721] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 341.052274][T16721] ? lock_downgrade+0x880/0x880 [ 341.057270][T16721] skb_clone+0x150/0x3b0 [ 341.061543][T16721] netlink_broadcast_filtered+0x870/0xb20 [ 341.067386][T16721] netlink_broadcast+0x3a/0x50 [ 341.072182][T16721] kobject_uevent_env+0xa94/0x1030 [ 341.077330][T16721] kobject_uevent+0x20/0x26 [ 341.081859][T16721] __loop_clr_fd+0x4ee/0xd60 [ 341.086481][T16721] lo_ioctl+0x210/0x2150 [ 341.090753][T16721] ? tomoyo_domain+0xc5/0x160 [ 341.095459][T16721] ? lo_rw_aio+0x1120/0x1120 [ 341.100072][T16721] blkdev_ioctl+0x6f2/0x1d10 [ 341.104703][T16721] ? blkpg_ioctl+0xa90/0xa90 [ 341.109320][T16721] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 341.115168][T16721] ? __fget+0x35a/0x550 [ 341.119350][T16721] block_ioctl+0xee/0x130 [ 341.123711][T16721] ? blkdev_fallocate+0x410/0x410 [ 341.128765][T16721] do_vfs_ioctl+0xd6e/0x1390 [ 341.133387][T16721] ? ioctl_preallocate+0x210/0x210 [ 341.138524][T16721] ? __fget+0x381/0x550 [ 341.142723][T16721] ? ksys_dup3+0x3e0/0x3e0 [ 341.147161][T16721] ? kfree+0x173/0x230 [ 341.151256][T16721] ? kfree+0x173/0x230 [ 341.156453][T16721] ? tomoyo_file_ioctl+0x23/0x30 [ 341.161415][T16721] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 341.167695][T16721] ? security_file_ioctl+0x93/0xc0 [ 341.172836][T16721] ksys_ioctl+0xab/0xd0 [ 341.177026][T16721] __x64_sys_ioctl+0x73/0xb0 [ 341.181648][T16721] do_syscall_64+0x103/0x610 [ 341.186466][T16721] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 341.192410][T16721] RIP: 0033:0x458127 [ 341.196330][T16721] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 341.215954][T16721] RSP: 002b:00007fd7659bca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 341.224474][T16721] RAX: ffffffffffffffda RBX: 00007fd7659bcb40 RCX: 0000000000458127 [ 341.232466][T16721] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000006 [ 341.240456][T16721] RBP: 0000000000000000 R08: 00007fd7659bcb40 R09: 00007fd7659bcae0 [ 341.248467][T16721] R10: 0000000000000025 R11: 0000000000000246 R12: 0000000000000005 20:41:41 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3b}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:41 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x0, 0x0, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 341.256480][T16721] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:42 executing program 5 (fault-call:2 fault-nth:39): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) 20:41:42 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') uselib(&(0x7f0000000000)='./file0\x00') ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) fcntl$getflags(r1, 0x0) socket$rds(0x15, 0x5, 0x0) setxattr$security_selinux(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000280)='system_u:object_r:dhcp_state_t:s0\x00', 0x22, 0x3) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f00000000c0)={0x8, {0x2, 0x498, 0x40, 0x4}}) 20:41:42 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x0, 0x0, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:42 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_ixize'}}, {@data_err_abort='data_err=abort'}]}) 20:41:42 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3f) getpeername$unix(r0, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) [ 341.702631][T16745] FAULT_INJECTION: forcing a failure. [ 341.702631][T16745] name failslab, interval 1, probability 0, space 0, times 0 20:41:42 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x0, 0x0, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 341.774397][T16745] CPU: 1 PID: 16745 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 341.782440][T16745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.792509][T16745] Call Trace: [ 341.795824][T16745] dump_stack+0x172/0x1f0 [ 341.800179][T16745] should_fail.cold+0xa/0x15 [ 341.804796][T16745] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 341.810628][T16745] ? ___might_sleep+0x163/0x280 [ 341.815499][T16745] __should_failslab+0x121/0x190 [ 341.820455][T16745] should_failslab+0x9/0x14 [ 341.824983][T16745] kmem_cache_alloc_node_trace+0x270/0x720 [ 341.830829][T16745] __kmalloc_node_track_caller+0x3d/0x70 [ 341.836489][T16745] __kmalloc_reserve.isra.0+0x40/0xf0 [ 341.841885][T16745] __alloc_skb+0x10b/0x5e0 [ 341.846317][T16745] ? skb_trim+0x190/0x190 [ 341.850681][T16745] ? kasan_check_read+0x11/0x20 [ 341.855557][T16745] alloc_uevent_skb+0x83/0x1e2 [ 341.860376][T16745] kobject_uevent_env+0xa63/0x1030 [ 341.865513][T16745] kobject_uevent+0x20/0x26 [ 341.870035][T16745] __loop_clr_fd+0x4ee/0xd60 [ 341.874644][T16745] lo_ioctl+0x210/0x2150 [ 341.878916][T16745] ? tomoyo_domain+0xc5/0x160 [ 341.883618][T16745] ? lo_rw_aio+0x1120/0x1120 [ 341.888227][T16745] blkdev_ioctl+0x6f2/0x1d10 [ 341.892847][T16745] ? blkpg_ioctl+0xa90/0xa90 [ 341.897456][T16745] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 341.903285][T16745] ? __fget+0x35a/0x550 [ 341.907459][T16745] block_ioctl+0xee/0x130 [ 341.911801][T16745] ? blkdev_fallocate+0x410/0x410 [ 341.916851][T16745] do_vfs_ioctl+0xd6e/0x1390 [ 341.921473][T16745] ? ioctl_preallocate+0x210/0x210 [ 341.926609][T16745] ? __fget+0x381/0x550 [ 341.930794][T16745] ? ksys_dup3+0x3e0/0x3e0 [ 341.935409][T16745] ? kfree+0x173/0x230 [ 341.939492][T16745] ? kfree+0x173/0x230 [ 341.943600][T16745] ? tomoyo_file_ioctl+0x23/0x30 [ 341.948554][T16745] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 341.954819][T16745] ? security_file_ioctl+0x93/0xc0 [ 341.959985][T16745] ksys_ioctl+0xab/0xd0 [ 341.964169][T16745] __x64_sys_ioctl+0x73/0xb0 [ 341.968775][T16745] do_syscall_64+0x103/0x610 [ 341.973384][T16745] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 341.979294][T16745] RIP: 0033:0x458127 [ 341.983201][T16745] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 342.002821][T16745] RSP: 002b:00007fd7659bca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 342.011260][T16745] RAX: ffffffffffffffda RBX: 00007fd7659bcb40 RCX: 0000000000458127 20:41:42 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x230f, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 342.019425][T16745] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000006 [ 342.027428][T16745] RBP: 0000000000000000 R08: 00007fd7659bcb40 R09: 00007fd7659bcae0 [ 342.035413][T16745] R10: 0000000000000025 R11: 0000000000000246 R12: 0000000000000005 [ 342.043402][T16745] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 20:41:42 executing program 5 (fault-call:2 fault-nth:40): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) 20:41:42 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x0, 0x1, 0x0, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:42 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x48}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:42 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000200)=0xe8) syz_mount_image$erofs(&(0x7f0000000500)='erofs\x00', &(0x7f0000000800)='./file0\x00', 0x0, 0x1, &(0x7f0000000880)=[{&(0x7f0000000840)="0d157f5d18bab58ec5c558fc4c6ea5b7ba19e77d77c20eb8812c125b36ca98ee7654f2eae5bd11ba35ae5e7fefb0bbef87a30d864a7f41c767424daa4011c1f4", 0x40, 0x5}], 0x1000, &(0x7f00000009c0)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}], [{@smackfsdef={'smackfsdef', 0x3d, '*trusted%ppp0GPL'}}]}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000700)={@in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x22}, 0x4}, {&(0x7f00000005c0)=""/28, 0x1c}, &(0x7f00000006c0), 0x1}, 0xa0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000380)={{{@in=@dev, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000000480)=0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="ffff3fff03ffffff0000000003000000e0040001ac1c14bbac1414bb"], 0x1c) syz_extract_tcp_res$synack(&(0x7f0000000540), 0x1, 0x0) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r1, r2, r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffff12e, 0xa, 0x9, 0x1, "6f8ba4b98879c9ba466b6c01c19b5a871a5b8837f92a5b136cfcf6a7158050c0069622878ea8fb82095b54eafaa436680e95b615167e0f0d8d3f28fa224e6def", "21942ce1ac358b54c5a9d6f66f553ceda17037465d14227d6b10f38981bb51d1", [0xb6, 0x1f]}) umount2(&(0x7f00000007c0)='./file0\x00', 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f0000000000)={{0xf001, 0x100000, 0x0, 0x1, 0x8, 0x1, 0x2, 0x3, 0x0, 0x8, 0x4, 0x1}, {0x5000, 0x0, 0xc, 0x9, 0x1, 0x5, 0x7, 0x1, 0x325, 0x9, 0x8, 0xfffffffffffffc00}, {0x4000, 0x4000, 0xe, 0x2, 0x9, 0x1f, 0xb8, 0x3bcb, 0x7fffffff, 0x8, 0x80000000, 0x400}, {0x3000, 0xf000, 0x8, 0x0, 0x6, 0x4f25, 0x3, 0x96c9, 0x1, 0x8001, 0x1, 0x100000000}, {0x6000, 0x5002, 0x1e, 0x1, 0x7f, 0x1ff, 0x100000001, 0x5, 0x1, 0x652265a0, 0x18b0, 0x3f}, {0x2000, 0x0, 0x0, 0x4, 0x2, 0x1, 0x0, 0x1000000000000000, 0x7, 0xfffffffffffffc00, 0x0, 0x20}, {0x1, 0x0, 0xc, 0x50f3, 0x80000000, 0x3, 0x9, 0x1, 0x1, 0x1000, 0x6, 0x400}, {0x1, 0xf000, 0xf, 0xfffffffffffffffa, 0x3ff, 0x80, 0xfffffffffffffffa, 0x8, 0x0, 0x6, 0x80000000, 0xfffffffffffff472}, {0xf000, 0x5005}, {0x5000, 0x1}, 0x20010000, 0x0, 0x4000, 0x110080, 0xd, 0x100, 0x2, [0x8, 0x3, 0x100000001, 0x1]}) r5 = getpgid(0xffffffffffffffff) rt_sigqueueinfo(r5, 0xd, &(0x7f0000000a40)={0x35, 0x527, 0x7ff}) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f00000004c0)={0x9, 0x101}) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:42 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x0, 0x1, 0x0, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:42 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isiz%'}}, {@data_err_abort='data_err=abort'}]}) [ 342.362586][T16766] FAULT_INJECTION: forcing a failure. [ 342.362586][T16766] name failslab, interval 1, probability 0, space 0, times 0 [ 342.394089][T16766] CPU: 1 PID: 16766 Comm: syz-executor.5 Not tainted 5.1.0-rc4+ #59 [ 342.402134][T16766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.412208][T16766] Call Trace: [ 342.415528][T16766] dump_stack+0x172/0x1f0 [ 342.419888][T16766] should_fail.cold+0xa/0x15 [ 342.424501][T16766] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 342.430328][T16766] ? ___might_sleep+0x163/0x280 [ 342.435200][T16766] __should_failslab+0x121/0x190 [ 342.440151][T16766] should_failslab+0x9/0x14 [ 342.444682][T16766] kmem_cache_alloc+0x2b2/0x6f0 [ 342.449554][T16766] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 342.455381][T16766] ? lock_downgrade+0x880/0x880 [ 342.460281][T16766] skb_clone+0x150/0x3b0 [ 342.464547][T16766] netlink_broadcast_filtered+0x870/0xb20 [ 342.470311][T16766] netlink_broadcast+0x3a/0x50 [ 342.475112][T16766] kobject_uevent_env+0xa94/0x1030 [ 342.480279][T16766] kobject_uevent+0x20/0x26 [ 342.484811][T16766] __loop_clr_fd+0x4ee/0xd60 [ 342.489428][T16766] lo_ioctl+0x210/0x2150 [ 342.493732][T16766] ? tomoyo_domain+0xc5/0x160 [ 342.498443][T16766] ? lo_rw_aio+0x1120/0x1120 [ 342.503059][T16766] blkdev_ioctl+0x6f2/0x1d10 [ 342.507697][T16766] ? blkpg_ioctl+0xa90/0xa90 [ 342.512319][T16766] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 342.518167][T16766] ? __fget+0x35a/0x550 [ 342.522356][T16766] block_ioctl+0xee/0x130 [ 342.526712][T16766] ? blkdev_fallocate+0x410/0x410 [ 342.531757][T16766] do_vfs_ioctl+0xd6e/0x1390 [ 342.536373][T16766] ? ioctl_preallocate+0x210/0x210 [ 342.541498][T16766] ? __fget+0x381/0x550 [ 342.545687][T16766] ? ksys_dup3+0x3e0/0x3e0 [ 342.550119][T16766] ? kfree+0x173/0x230 [ 342.554201][T16766] ? kfree+0x173/0x230 [ 342.558488][T16766] ? tomoyo_file_ioctl+0x23/0x30 [ 342.563449][T16766] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 342.569721][T16766] ? security_file_ioctl+0x93/0xc0 [ 342.574856][T16766] ksys_ioctl+0xab/0xd0 [ 342.579032][T16766] __x64_sys_ioctl+0x73/0xb0 [ 342.583640][T16766] do_syscall_64+0x103/0x610 [ 342.588258][T16766] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 342.594339][T16766] RIP: 0033:0x458127 [ 342.598247][T16766] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 342.617888][T16766] RSP: 002b:00007fd7659bca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 342.626351][T16766] RAX: ffffffffffffffda RBX: 00007fd7659bcb40 RCX: 0000000000458127 [ 342.634346][T16766] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000006 [ 342.642331][T16766] RBP: 0000000000000000 R08: 00007fd7659bcb40 R09: 00007fd7659bcae0 [ 342.650319][T16766] R10: 0000000000000025 R11: 0000000000000246 R12: 0000000000000005 20:41:43 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2d00, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 342.658309][T16766] R13: 00000000004c6b2d R14: 00000000004dc4e8 R15: 0000000000000004 [ 342.723107][T16777] EXT4-fs: 20 callbacks suppressed [ 342.723123][T16777] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz%=0x0000000000000000" or missing value 20:41:43 executing program 5 (fault-call:2 fault-nth:41): creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) 20:41:43 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000200)=0xe8) syz_mount_image$erofs(&(0x7f0000000500)='erofs\x00', &(0x7f0000000800)='./file0\x00', 0x0, 0x1, &(0x7f0000000880)=[{&(0x7f0000000840)="0d157f5d18bab58ec5c558fc4c6ea5b7ba19e77d77c20eb8812c125b36ca98ee7654f2eae5bd11ba35ae5e7fefb0bbef87a30d864a7f41c767424daa4011c1f4", 0x40, 0x5}], 0x1000, &(0x7f00000009c0)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}], [{@smackfsdef={'smackfsdef', 0x3d, '*trusted%ppp0GPL'}}]}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000700)={@in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x22}, 0x4}, {&(0x7f00000005c0)=""/28, 0x1c}, &(0x7f00000006c0), 0x1}, 0xa0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000380)={{{@in=@dev, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000000480)=0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="ffff3fff03ffffff0000000003000000e0040001ac1c14bbac1414bb"], 0x1c) syz_extract_tcp_res$synack(&(0x7f0000000540), 0x1, 0x0) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r1, r2, r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffff12e, 0xa, 0x9, 0x1, "6f8ba4b98879c9ba466b6c01c19b5a871a5b8837f92a5b136cfcf6a7158050c0069622878ea8fb82095b54eafaa436680e95b615167e0f0d8d3f28fa224e6def", "21942ce1ac358b54c5a9d6f66f553ceda17037465d14227d6b10f38981bb51d1", [0xb6, 0x1f]}) umount2(&(0x7f00000007c0)='./file0\x00', 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f0000000000)={{0xf001, 0x100000, 0x0, 0x1, 0x8, 0x1, 0x2, 0x3, 0x0, 0x8, 0x4, 0x1}, {0x5000, 0x0, 0xc, 0x9, 0x1, 0x5, 0x7, 0x1, 0x325, 0x9, 0x8, 0xfffffffffffffc00}, {0x4000, 0x4000, 0xe, 0x2, 0x9, 0x1f, 0xb8, 0x3bcb, 0x7fffffff, 0x8, 0x80000000, 0x400}, {0x3000, 0xf000, 0x8, 0x0, 0x6, 0x4f25, 0x3, 0x96c9, 0x1, 0x8001, 0x1, 0x100000000}, {0x6000, 0x5002, 0x1e, 0x1, 0x7f, 0x1ff, 0x100000001, 0x5, 0x1, 0x652265a0, 0x18b0, 0x3f}, {0x2000, 0x0, 0x0, 0x4, 0x2, 0x1, 0x0, 0x1000000000000000, 0x7, 0xfffffffffffffc00, 0x0, 0x20}, {0x1, 0x0, 0xc, 0x50f3, 0x80000000, 0x3, 0x9, 0x1, 0x1, 0x1000, 0x6, 0x400}, {0x1, 0xf000, 0xf, 0xfffffffffffffffa, 0x3ff, 0x80, 0xfffffffffffffffa, 0x8, 0x0, 0x6, 0x80000000, 0xfffffffffffff472}, {0xf000, 0x5005}, {0x5000, 0x1}, 0x20010000, 0x0, 0x4000, 0x110080, 0xd, 0x100, 0x2, [0x8, 0x3, 0x100000001, 0x1]}) r5 = getpgid(0xffffffffffffffff) rt_sigqueueinfo(r5, 0xd, &(0x7f0000000a40)={0x35, 0x527, 0x7ff}) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f00000004c0)={0x9, 0x101}) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) [ 342.832607][T16784] EXT4-fs (sda1): Unrecognized mount option "fowner>00000000000000000000" or missing value 20:41:43 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x0, 0x1, 0x0, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 342.933963][T16783] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 20:41:43 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000200)=0xe8) syz_mount_image$erofs(&(0x7f0000000500)='erofs\x00', &(0x7f0000000800)='./file0\x00', 0x0, 0x1, &(0x7f0000000880)=[{&(0x7f0000000840)="0d157f5d18bab58ec5c558fc4c6ea5b7ba19e77d77c20eb8812c125b36ca98ee7654f2eae5bd11ba35ae5e7fefb0bbef87a30d864a7f41c767424daa4011c1f4", 0x40, 0x5}], 0x1000, &(0x7f00000009c0)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}], [{@smackfsdef={'smackfsdef', 0x3d, '*trusted%ppp0GPL'}}]}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000700)={@in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x22}, 0x4}, {&(0x7f00000005c0)=""/28, 0x1c}, &(0x7f00000006c0), 0x1}, 0xa0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000380)={{{@in=@dev, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000000480)=0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="ffff3fff03ffffff0000000003000000e0040001ac1c14bbac1414bb"], 0x1c) syz_extract_tcp_res$synack(&(0x7f0000000540), 0x1, 0x0) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r1, r2, r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffff12e, 0xa, 0x9, 0x1, "6f8ba4b98879c9ba466b6c01c19b5a871a5b8837f92a5b136cfcf6a7158050c0069622878ea8fb82095b54eafaa436680e95b615167e0f0d8d3f28fa224e6def", "21942ce1ac358b54c5a9d6f66f553ceda17037465d14227d6b10f38981bb51d1", [0xb6, 0x1f]}) umount2(&(0x7f00000007c0)='./file0\x00', 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f0000000000)={{0xf001, 0x100000, 0x0, 0x1, 0x8, 0x1, 0x2, 0x3, 0x0, 0x8, 0x4, 0x1}, {0x5000, 0x0, 0xc, 0x9, 0x1, 0x5, 0x7, 0x1, 0x325, 0x9, 0x8, 0xfffffffffffffc00}, {0x4000, 0x4000, 0xe, 0x2, 0x9, 0x1f, 0xb8, 0x3bcb, 0x7fffffff, 0x8, 0x80000000, 0x400}, {0x3000, 0xf000, 0x8, 0x0, 0x6, 0x4f25, 0x3, 0x96c9, 0x1, 0x8001, 0x1, 0x100000000}, {0x6000, 0x5002, 0x1e, 0x1, 0x7f, 0x1ff, 0x100000001, 0x5, 0x1, 0x652265a0, 0x18b0, 0x3f}, {0x2000, 0x0, 0x0, 0x4, 0x2, 0x1, 0x0, 0x1000000000000000, 0x7, 0xfffffffffffffc00, 0x0, 0x20}, {0x1, 0x0, 0xc, 0x50f3, 0x80000000, 0x3, 0x9, 0x1, 0x1, 0x1000, 0x6, 0x400}, {0x1, 0xf000, 0xf, 0xfffffffffffffffa, 0x3ff, 0x80, 0xfffffffffffffffa, 0x8, 0x0, 0x6, 0x80000000, 0xfffffffffffff472}, {0xf000, 0x5005}, {0x5000, 0x1}, 0x20010000, 0x0, 0x4000, 0x110080, 0xd, 0x100, 0x2, [0x8, 0x3, 0x100000001, 0x1]}) r5 = getpgid(0xffffffffffffffff) rt_sigqueueinfo(r5, 0xd, &(0x7f0000000a40)={0x35, 0x527, 0x7ff}) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f00000004c0)={0x9, 0x101}) lsetxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x0) 20:41:43 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x4c}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:43 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x25}}, {@data_err_abort='data_err=abort'}]}) 20:41:43 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) [ 343.115725][T16797] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 20:41:43 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x3b00, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 20:41:43 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x0, 0x5, 0x1, 0x0, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 343.184126][T16806] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize%0x0000000000000000" or missing value 20:41:43 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000200)=0xe8) syz_mount_image$erofs(&(0x7f0000000500)='erofs\x00', &(0x7f0000000800)='./file0\x00', 0x0, 0x1, &(0x7f0000000880)=[{&(0x7f0000000840)="0d157f5d18bab58ec5c558fc4c6ea5b7ba19e77d77c20eb8812c125b36ca98ee7654f2eae5bd11ba35ae5e7fefb0bbef87a30d864a7f41c767424daa4011c1f4", 0x40, 0x5}], 0x1000, &(0x7f00000009c0)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}], [{@smackfsdef={'smackfsdef', 0x3d, '*trusted%ppp0GPL'}}]}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000700)={@in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x22}, 0x4}, {&(0x7f00000005c0)=""/28, 0x1c}, &(0x7f00000006c0), 0x1}, 0xa0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000380)={{{@in=@dev, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000000480)=0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="ffff3fff03ffffff0000000003000000e0040001ac1c14bbac1414bb"], 0x1c) syz_extract_tcp_res$synack(&(0x7f0000000540), 0x1, 0x0) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r1, r2, r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffff12e, 0xa, 0x9, 0x1, "6f8ba4b98879c9ba466b6c01c19b5a871a5b8837f92a5b136cfcf6a7158050c0069622878ea8fb82095b54eafaa436680e95b615167e0f0d8d3f28fa224e6def", "21942ce1ac358b54c5a9d6f66f553ceda17037465d14227d6b10f38981bb51d1", [0xb6, 0x1f]}) umount2(&(0x7f00000007c0)='./file0\x00', 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f0000000000)={{0xf001, 0x100000, 0x0, 0x1, 0x8, 0x1, 0x2, 0x3, 0x0, 0x8, 0x4, 0x1}, {0x5000, 0x0, 0xc, 0x9, 0x1, 0x5, 0x7, 0x1, 0x325, 0x9, 0x8, 0xfffffffffffffc00}, {0x4000, 0x4000, 0xe, 0x2, 0x9, 0x1f, 0xb8, 0x3bcb, 0x7fffffff, 0x8, 0x80000000, 0x400}, {0x3000, 0xf000, 0x8, 0x0, 0x6, 0x4f25, 0x3, 0x96c9, 0x1, 0x8001, 0x1, 0x100000000}, {0x6000, 0x5002, 0x1e, 0x1, 0x7f, 0x1ff, 0x100000001, 0x5, 0x1, 0x652265a0, 0x18b0, 0x3f}, {0x2000, 0x0, 0x0, 0x4, 0x2, 0x1, 0x0, 0x1000000000000000, 0x7, 0xfffffffffffffc00, 0x0, 0x20}, {0x1, 0x0, 0xc, 0x50f3, 0x80000000, 0x3, 0x9, 0x1, 0x1, 0x1000, 0x6, 0x400}, {0x1, 0xf000, 0xf, 0xfffffffffffffffa, 0x3ff, 0x80, 0xfffffffffffffffa, 0x8, 0x0, 0x6, 0x80000000, 0xfffffffffffff472}, {0xf000, 0x5005}, {0x5000, 0x1}, 0x20010000, 0x0, 0x4000, 0x110080, 0xd, 0x100, 0x2, [0x8, 0x3, 0x100000001, 0x1]}) r5 = getpgid(0xffffffffffffffff) rt_sigqueueinfo(r5, 0xd, &(0x7f0000000a40)={0x35, 0x527, 0x7ff}) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f00000004c0)={0x9, 0x101}) [ 343.268254][T16805] EXT4-fs (sda1): Unrecognized mount option "fowner>00000000000000000000" or missing value [ 343.472834][T16814] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize%0x0000000000000000" or missing value 20:41:44 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2, 0x0, 0x0, 0x25, 0x0) 20:41:44 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x2d}}, {@data_err_abort='data_err=abort'}]}) [ 343.582538][T16816] EXT4-fs (sda1): Unrecognized mount option "fowner>00000000000000000000" or missing value 20:41:44 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x0, 0x5, 0x1, 0x0, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:44 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x60}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) [ 343.649775][T16820] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 20:41:44 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000200)=0xe8) syz_mount_image$erofs(&(0x7f0000000500)='erofs\x00', &(0x7f0000000800)='./file0\x00', 0x0, 0x1, &(0x7f0000000880)=[{&(0x7f0000000840)="0d157f5d18bab58ec5c558fc4c6ea5b7ba19e77d77c20eb8812c125b36ca98ee7654f2eae5bd11ba35ae5e7fefb0bbef87a30d864a7f41c767424daa4011c1f4", 0x40, 0x5}], 0x1000, &(0x7f00000009c0)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}], [{@smackfsdef={'smackfsdef', 0x3d, '*trusted%ppp0GPL'}}]}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000700)={@in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x22}, 0x4}, {&(0x7f00000005c0)=""/28, 0x1c}, &(0x7f00000006c0), 0x1}, 0xa0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000380)={{{@in=@dev, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000000480)=0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="ffff3fff03ffffff0000000003000000e0040001ac1c14bbac1414bb"], 0x1c) syz_extract_tcp_res$synack(&(0x7f0000000540), 0x1, 0x0) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r1, r2, r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffff12e, 0xa, 0x9, 0x1, "6f8ba4b98879c9ba466b6c01c19b5a871a5b8837f92a5b136cfcf6a7158050c0069622878ea8fb82095b54eafaa436680e95b615167e0f0d8d3f28fa224e6def", "21942ce1ac358b54c5a9d6f66f553ceda17037465d14227d6b10f38981bb51d1", [0xb6, 0x1f]}) umount2(&(0x7f00000007c0)='./file0\x00', 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f0000000000)={{0xf001, 0x100000, 0x0, 0x1, 0x8, 0x1, 0x2, 0x3, 0x0, 0x8, 0x4, 0x1}, {0x5000, 0x0, 0xc, 0x9, 0x1, 0x5, 0x7, 0x1, 0x325, 0x9, 0x8, 0xfffffffffffffc00}, {0x4000, 0x4000, 0xe, 0x2, 0x9, 0x1f, 0xb8, 0x3bcb, 0x7fffffff, 0x8, 0x80000000, 0x400}, {0x3000, 0xf000, 0x8, 0x0, 0x6, 0x4f25, 0x3, 0x96c9, 0x1, 0x8001, 0x1, 0x100000000}, {0x6000, 0x5002, 0x1e, 0x1, 0x7f, 0x1ff, 0x100000001, 0x5, 0x1, 0x652265a0, 0x18b0, 0x3f}, {0x2000, 0x0, 0x0, 0x4, 0x2, 0x1, 0x0, 0x1000000000000000, 0x7, 0xfffffffffffffc00, 0x0, 0x20}, {0x1, 0x0, 0xc, 0x50f3, 0x80000000, 0x3, 0x9, 0x1, 0x1, 0x1000, 0x6, 0x400}, {0x1, 0xf000, 0xf, 0xfffffffffffffffa, 0x3ff, 0x80, 0xfffffffffffffffa, 0x8, 0x0, 0x6, 0x80000000, 0xfffffffffffff472}, {0xf000, 0x5005}, {0x5000, 0x1}, 0x20010000, 0x0, 0x4000, 0x110080, 0xd, 0x100, 0x2, [0x8, 0x3, 0x100000001, 0x1]}) r5 = getpgid(0xffffffffffffffff) rt_sigqueueinfo(r5, 0xd, &(0x7f0000000a40)={0x35, 0x527, 0x7ff}) 20:41:44 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x0, 0x5, 0x1, 0x0, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 343.907496][T16833] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 20:41:44 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x3f00, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 20:41:44 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x3, 0x0, 0x0, 0x25, 0x0) 20:41:44 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3b}}, {@data_err_abort='data_err=abort'}]}) 20:41:44 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x0, 0x1, 0x5, 0x1, 0x0, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:44 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000200)=0xe8) syz_mount_image$erofs(&(0x7f0000000500)='erofs\x00', &(0x7f0000000800)='./file0\x00', 0x0, 0x1, &(0x7f0000000880)=[{&(0x7f0000000840)="0d157f5d18bab58ec5c558fc4c6ea5b7ba19e77d77c20eb8812c125b36ca98ee7654f2eae5bd11ba35ae5e7fefb0bbef87a30d864a7f41c767424daa4011c1f4", 0x40, 0x5}], 0x1000, &(0x7f00000009c0)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}], [{@smackfsdef={'smackfsdef', 0x3d, '*trusted%ppp0GPL'}}]}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000700)={@in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x22}, 0x4}, {&(0x7f00000005c0)=""/28, 0x1c}, &(0x7f00000006c0), 0x1}, 0xa0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000380)={{{@in=@dev, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000000480)=0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="ffff3fff03ffffff0000000003000000e0040001ac1c14bbac1414bb"], 0x1c) syz_extract_tcp_res$synack(&(0x7f0000000540), 0x1, 0x0) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r1, r2, r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffff12e, 0xa, 0x9, 0x1, "6f8ba4b98879c9ba466b6c01c19b5a871a5b8837f92a5b136cfcf6a7158050c0069622878ea8fb82095b54eafaa436680e95b615167e0f0d8d3f28fa224e6def", "21942ce1ac358b54c5a9d6f66f553ceda17037465d14227d6b10f38981bb51d1", [0xb6, 0x1f]}) umount2(&(0x7f00000007c0)='./file0\x00', 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f0000000000)={{0xf001, 0x100000, 0x0, 0x1, 0x8, 0x1, 0x2, 0x3, 0x0, 0x8, 0x4, 0x1}, {0x5000, 0x0, 0xc, 0x9, 0x1, 0x5, 0x7, 0x1, 0x325, 0x9, 0x8, 0xfffffffffffffc00}, {0x4000, 0x4000, 0xe, 0x2, 0x9, 0x1f, 0xb8, 0x3bcb, 0x7fffffff, 0x8, 0x80000000, 0x400}, {0x3000, 0xf000, 0x8, 0x0, 0x6, 0x4f25, 0x3, 0x96c9, 0x1, 0x8001, 0x1, 0x100000000}, {0x6000, 0x5002, 0x1e, 0x1, 0x7f, 0x1ff, 0x100000001, 0x5, 0x1, 0x652265a0, 0x18b0, 0x3f}, {0x2000, 0x0, 0x0, 0x4, 0x2, 0x1, 0x0, 0x1000000000000000, 0x7, 0xfffffffffffffc00, 0x0, 0x20}, {0x1, 0x0, 0xc, 0x50f3, 0x80000000, 0x3, 0x9, 0x1, 0x1, 0x1000, 0x6, 0x400}, {0x1, 0xf000, 0xf, 0xfffffffffffffffa, 0x3ff, 0x80, 0xfffffffffffffffa, 0x8, 0x0, 0x6, 0x80000000, 0xfffffffffffff472}, {0xf000, 0x5005}, {0x5000, 0x1}, 0x20010000, 0x0, 0x4000, 0x110080, 0xd, 0x100, 0x2, [0x8, 0x3, 0x100000001, 0x1]}) getpgid(0xffffffffffffffff) 20:41:44 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:44 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x0, 0x1, 0x5, 0x1, 0x0, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:45 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x4, 0x0, 0x0, 0x25, 0x0) 20:41:45 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x4000, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 20:41:45 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000200)=0xe8) syz_mount_image$erofs(&(0x7f0000000500)='erofs\x00', &(0x7f0000000800)='./file0\x00', 0x0, 0x1, &(0x7f0000000880)=[{&(0x7f0000000840)="0d157f5d18bab58ec5c558fc4c6ea5b7ba19e77d77c20eb8812c125b36ca98ee7654f2eae5bd11ba35ae5e7fefb0bbef87a30d864a7f41c767424daa4011c1f4", 0x40, 0x5}], 0x1000, &(0x7f00000009c0)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}], [{@smackfsdef={'smackfsdef', 0x3d, '*trusted%ppp0GPL'}}]}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000700)={@in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x22}, 0x4}, {&(0x7f00000005c0)=""/28, 0x1c}, &(0x7f00000006c0), 0x1}, 0xa0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000380)={{{@in=@dev, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000000480)=0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="ffff3fff03ffffff0000000003000000e0040001ac1c14bbac1414bb"], 0x1c) syz_extract_tcp_res$synack(&(0x7f0000000540), 0x1, 0x0) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r1, r2, r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffff12e, 0xa, 0x9, 0x1, "6f8ba4b98879c9ba466b6c01c19b5a871a5b8837f92a5b136cfcf6a7158050c0069622878ea8fb82095b54eafaa436680e95b615167e0f0d8d3f28fa224e6def", "21942ce1ac358b54c5a9d6f66f553ceda17037465d14227d6b10f38981bb51d1", [0xb6, 0x1f]}) umount2(&(0x7f00000007c0)='./file0\x00', 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f0000000000)={{0xf001, 0x100000, 0x0, 0x1, 0x8, 0x1, 0x2, 0x3, 0x0, 0x8, 0x4, 0x1}, {0x5000, 0x0, 0xc, 0x9, 0x1, 0x5, 0x7, 0x1, 0x325, 0x9, 0x8, 0xfffffffffffffc00}, {0x4000, 0x4000, 0xe, 0x2, 0x9, 0x1f, 0xb8, 0x3bcb, 0x7fffffff, 0x8, 0x80000000, 0x400}, {0x3000, 0xf000, 0x8, 0x0, 0x6, 0x4f25, 0x3, 0x96c9, 0x1, 0x8001, 0x1, 0x100000000}, {0x6000, 0x5002, 0x1e, 0x1, 0x7f, 0x1ff, 0x100000001, 0x5, 0x1, 0x652265a0, 0x18b0, 0x3f}, {0x2000, 0x0, 0x0, 0x4, 0x2, 0x1, 0x0, 0x1000000000000000, 0x7, 0xfffffffffffffc00, 0x0, 0x20}, {0x1, 0x0, 0xc, 0x50f3, 0x80000000, 0x3, 0x9, 0x1, 0x1, 0x1000, 0x6, 0x400}, {0x1, 0xf000, 0xf, 0xfffffffffffffffa, 0x3ff, 0x80, 0xfffffffffffffffa, 0x8, 0x0, 0x6, 0x80000000, 0xfffffffffffff472}, {0xf000, 0x5005}, {0x5000, 0x1}, 0x20010000, 0x0, 0x4000, 0x110080, 0xd, 0x100, 0x2, [0x8, 0x3, 0x100000001, 0x1]}) 20:41:45 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x0, 0x1, 0x5, 0x1, 0x0, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:45 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2}}, {@data_err_abort='data_err=abort'}]}) 20:41:45 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6c}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:45 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x0, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x0, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:45 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x4800, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 20:41:45 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x5, 0x0, 0x0, 0x25, 0x0) 20:41:45 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000200)=0xe8) syz_mount_image$erofs(&(0x7f0000000500)='erofs\x00', &(0x7f0000000800)='./file0\x00', 0x0, 0x1, &(0x7f0000000880)=[{&(0x7f0000000840)="0d157f5d18bab58ec5c558fc4c6ea5b7ba19e77d77c20eb8812c125b36ca98ee7654f2eae5bd11ba35ae5e7fefb0bbef87a30d864a7f41c767424daa4011c1f4", 0x40, 0x5}], 0x1000, &(0x7f00000009c0)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}], [{@smackfsdef={'smackfsdef', 0x3d, '*trusted%ppp0GPL'}}]}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000700)={@in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x22}, 0x4}, {&(0x7f00000005c0)=""/28, 0x1c}, &(0x7f00000006c0), 0x1}, 0xa0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000380)={{{@in=@dev, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000000480)=0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="ffff3fff03ffffff0000000003000000e0040001ac1c14bbac1414bb"], 0x1c) syz_extract_tcp_res$synack(&(0x7f0000000540), 0x1, 0x0) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r1, r2, r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffff12e, 0xa, 0x9, 0x1, "6f8ba4b98879c9ba466b6c01c19b5a871a5b8837f92a5b136cfcf6a7158050c0069622878ea8fb82095b54eafaa436680e95b615167e0f0d8d3f28fa224e6def", "21942ce1ac358b54c5a9d6f66f553ceda17037465d14227d6b10f38981bb51d1", [0xb6, 0x1f]}) umount2(&(0x7f00000007c0)='./file0\x00', 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 20:41:45 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x0, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x0, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:45 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}, {@data_err_abort='data_err=abort'}]}) 20:41:45 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x0, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x0, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:45 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x74}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:45 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000200)=0xe8) syz_mount_image$erofs(&(0x7f0000000500)='erofs\x00', &(0x7f0000000800)='./file0\x00', 0x0, 0x1, &(0x7f0000000880)=[{&(0x7f0000000840)="0d157f5d18bab58ec5c558fc4c6ea5b7ba19e77d77c20eb8812c125b36ca98ee7654f2eae5bd11ba35ae5e7fefb0bbef87a30d864a7f41c767424daa4011c1f4", 0x40, 0x5}], 0x1000, &(0x7f00000009c0)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}], [{@smackfsdef={'smackfsdef', 0x3d, '*trusted%ppp0GPL'}}]}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000700)={@in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x22}, 0x4}, {&(0x7f00000005c0)=""/28, 0x1c}, &(0x7f00000006c0), 0x1}, 0xa0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000380)={{{@in=@dev, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000000480)=0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="ffff3fff03ffffff0000000003000000e0040001ac1c14bbac1414bb"], 0x1c) syz_extract_tcp_res$synack(&(0x7f0000000540), 0x1, 0x0) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r1, r2, r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffff12e, 0xa, 0x9, 0x1, "6f8ba4b98879c9ba466b6c01c19b5a871a5b8837f92a5b136cfcf6a7158050c0069622878ea8fb82095b54eafaa436680e95b615167e0f0d8d3f28fa224e6def", "21942ce1ac358b54c5a9d6f66f553ceda17037465d14227d6b10f38981bb51d1", [0xb6, 0x1f]}) umount2(&(0x7f00000007c0)='./file0\x00', 0x8) 20:41:46 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x4c00, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 20:41:46 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x6, 0x0, 0x0, 0x25, 0x0) 20:41:46 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x0, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x0, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:46 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x4}}, {@data_err_abort='data_err=abort'}]}) 20:41:46 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000200)=0xe8) syz_mount_image$erofs(&(0x7f0000000500)='erofs\x00', &(0x7f0000000800)='./file0\x00', 0x0, 0x1, &(0x7f0000000880)=[{&(0x7f0000000840)="0d157f5d18bab58ec5c558fc4c6ea5b7ba19e77d77c20eb8812c125b36ca98ee7654f2eae5bd11ba35ae5e7fefb0bbef87a30d864a7f41c767424daa4011c1f4", 0x40, 0x5}], 0x1000, &(0x7f00000009c0)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}], [{@smackfsdef={'smackfsdef', 0x3d, '*trusted%ppp0GPL'}}]}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000700)={@in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x22}, 0x4}, {&(0x7f00000005c0)=""/28, 0x1c}, &(0x7f00000006c0), 0x1}, 0xa0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000380)={{{@in=@dev, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000000480)=0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="ffff3fff03ffffff0000000003000000e0040001ac1c14bbac1414bb"], 0x1c) syz_extract_tcp_res$synack(&(0x7f0000000540), 0x1, 0x0) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r1, r2, r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffff12e, 0xa, 0x9, 0x1, "6f8ba4b98879c9ba466b6c01c19b5a871a5b8837f92a5b136cfcf6a7158050c0069622878ea8fb82095b54eafaa436680e95b615167e0f0d8d3f28fa224e6def", "21942ce1ac358b54c5a9d6f66f553ceda17037465d14227d6b10f38981bb51d1", [0xb6, 0x1f]}) umount2(&(0x7f00000007c0)='./file0\x00', 0x8) 20:41:46 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x0, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x0, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:46 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7a}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:46 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x6800, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 20:41:46 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x7, 0x0, 0x0, 0x25, 0x0) 20:41:46 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000200)=0xe8) syz_mount_image$erofs(&(0x7f0000000500)='erofs\x00', &(0x7f0000000800)='./file0\x00', 0x0, 0x1, &(0x7f0000000880)=[{&(0x7f0000000840)="0d157f5d18bab58ec5c558fc4c6ea5b7ba19e77d77c20eb8812c125b36ca98ee7654f2eae5bd11ba35ae5e7fefb0bbef87a30d864a7f41c767424daa4011c1f4", 0x40, 0x5}], 0x1000, &(0x7f00000009c0)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}], [{@smackfsdef={'smackfsdef', 0x3d, '*trusted%ppp0GPL'}}]}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000700)={@in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x22}, 0x4}, {&(0x7f00000005c0)=""/28, 0x1c}, &(0x7f00000006c0), 0x1}, 0xa0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000380)={{{@in=@dev, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000000480)=0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="ffff3fff03ffffff0000000003000000e0040001ac1c14bbac1414bb"], 0x1c) syz_extract_tcp_res$synack(&(0x7f0000000540), 0x1, 0x0) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r1, r2, r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffff12e, 0xa, 0x9, 0x1, "6f8ba4b98879c9ba466b6c01c19b5a871a5b8837f92a5b136cfcf6a7158050c0069622878ea8fb82095b54eafaa436680e95b615167e0f0d8d3f28fa224e6def", "21942ce1ac358b54c5a9d6f66f553ceda17037465d14227d6b10f38981bb51d1", [0xb6, 0x1f]}) umount2(&(0x7f00000007c0)='./file0\x00', 0x8) 20:41:46 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x0, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x0, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:46 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5}}, {@data_err_abort='data_err=abort'}]}) 20:41:46 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0x0, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x0, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) 20:41:46 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}, {@data_err_abort='data_err=abort'}], [{@fowner_gt={'fowner>'}}]}) 20:41:46 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x6c00, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 20:41:47 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x10, 0x0, 0x0, 0x25, 0x0) 20:41:47 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000200)=0xe8) syz_mount_image$erofs(&(0x7f0000000500)='erofs\x00', &(0x7f0000000800)='./file0\x00', 0x0, 0x1, &(0x7f0000000880)=[{&(0x7f0000000840)="0d157f5d18bab58ec5c558fc4c6ea5b7ba19e77d77c20eb8812c125b36ca98ee7654f2eae5bd11ba35ae5e7fefb0bbef87a30d864a7f41c767424daa4011c1f4", 0x40, 0x5}], 0x1000, &(0x7f00000009c0)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}], [{@smackfsdef={'smackfsdef', 0x3d, '*trusted%ppp0GPL'}}]}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000700)={@in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x22}, 0x4}, {&(0x7f00000005c0)=""/28, 0x1c}, &(0x7f00000006c0), 0x1}, 0xa0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000380)={{{@in=@dev, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000000480)=0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="ffff3fff03ffffff0000000003000000e0040001ac1c14bbac1414bb"], 0x1c) syz_extract_tcp_res$synack(&(0x7f0000000540), 0x1, 0x0) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r1, r2, r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffff12e, 0xa, 0x9, 0x1, "6f8ba4b98879c9ba466b6c01c19b5a871a5b8837f92a5b136cfcf6a7158050c0069622878ea8fb82095b54eafaa436680e95b615167e0f0d8d3f28fa224e6def", "21942ce1ac358b54c5a9d6f66f553ceda17037465d14227d6b10f38981bb51d1", [0xb6, 0x1f]}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 20:41:47 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0x0, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x0, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 346.495451][ T7928] ================================================================== [ 346.503919][ T7928] BUG: KASAN: use-after-free in __ext4_expand_extra_isize+0x16c/0x240 [ 346.512102][ T7928] Write of size 646 at addr ffff88806f1e7efa by task syz-executor.2/7928 [ 346.520518][ T7928] [ 346.522865][ T7928] CPU: 0 PID: 7928 Comm: syz-executor.2 Not tainted 5.1.0-rc4+ #59 [ 346.530771][ T7928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.540840][ T7928] Call Trace: [ 346.544157][ T7928] dump_stack+0x172/0x1f0 [ 346.548509][ T7928] ? __ext4_expand_extra_isize+0x16c/0x240 [ 346.554344][ T7928] print_address_description.cold+0x7c/0x20d [ 346.560347][ T7928] ? __ext4_expand_extra_isize+0x16c/0x240 [ 346.566179][ T7928] ? __ext4_expand_extra_isize+0x16c/0x240 [ 346.572006][ T7928] kasan_report.cold+0x1b/0x40 [ 346.576806][ T7928] ? __ext4_expand_extra_isize+0x16c/0x240 [ 346.582642][ T7928] check_memory_region+0x123/0x190 [ 346.587789][ T7928] memset+0x24/0x40 [ 346.591622][ T7928] __ext4_expand_extra_isize+0x16c/0x240 [ 346.597302][ T7928] ext4_mark_inode_dirty+0x6e9/0x940 [ 346.602616][ T7928] ? ext4_expand_extra_isize+0x550/0x550 [ 346.608271][ T7928] ? ___might_sleep+0x163/0x280 [ 346.613156][ T7928] ? __might_sleep+0x95/0x190 [ 346.617859][ T7928] ? ext4_journal_check_start+0x188/0x230 [ 346.623609][ T7928] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 346.629874][ T7928] ? __ext4_journal_start_sb+0x12d/0x4a0 [ 346.635538][ T7928] ext4_dirty_inode+0x8f/0xc0 [ 346.640247][ T7928] ? ext4_setattr+0x2450/0x2450 [ 346.645125][ T7928] __mark_inode_dirty+0x919/0x1290 [ 346.650260][ T7928] ? current_time+0xd8/0x140 [ 346.654885][ T7928] generic_update_time+0x21c/0x370 [ 346.660023][ T7928] ? file_remove_privs+0x480/0x480 [ 346.665159][ T7928] touch_atime+0x23e/0x2a0 [ 346.669596][ T7928] ? atime_needs_update+0x5f0/0x5f0 [ 346.674827][ T7928] ? mntget+0x41/0x50 [ 346.678832][ T7928] trailing_symlink+0x2d4/0x970 [ 346.683794][ T7928] path_mountpoint+0x868/0x1e60 [ 346.688660][ T7928] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 346.694943][ T7928] ? path_openat+0x46e0/0x46e0 [ 346.699738][ T7928] ? cache_grow_end+0xa4/0x190 [ 346.704637][ T7928] filename_mountpoint+0x190/0x3c0 [ 346.709779][ T7928] ? filename_parentat.isra.0+0x410/0x410 [ 346.715535][ T7928] ? __phys_addr_symbol+0x30/0x70 [ 346.720587][ T7928] ? __check_object_size+0x3d/0x42f [ 346.725825][ T7928] ? strncpy_from_user+0x2a8/0x380 [ 346.730964][ T7928] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 346.737793][ T7928] ? getname_flags+0x277/0x5b0 20:41:47 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6}}, {@data_err_abort='data_err=abort'}]}) 20:41:47 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x7400, 0x0, 0x0, 0x28, &(0x7f0000000540)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 346.742593][ T7928] user_path_mountpoint_at+0x3a/0x50 [ 346.747902][ T7928] ksys_umount+0x167/0xf00 [ 346.752336][ T7928] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 346.758594][ T7928] ? __detach_mounts+0x320/0x320 [ 346.763572][ T7928] ? kasan_check_write+0x14/0x20 [ 346.768531][ T7928] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 346.774103][ T7928] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 346.779583][ T7928] ? do_syscall_64+0x26/0x610 [ 346.784281][ T7928] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 346.790455][ T7928] ? do_syscall_64+0x26/0x610 [ 346.795156][ T7928] ? lockdep_hardirqs_on+0x418/0x5d0 [ 346.800467][ T7928] __x64_sys_umount+0x54/0x80 [ 346.805168][ T7928] do_syscall_64+0x103/0x610 [ 346.809782][ T7928] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 346.815697][ T7928] RIP: 0033:0x45ad07 [ 346.819606][ T7928] Code: 44 00 00 b8 08 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 346.839230][ T7928] RSP: 002b:00007ffdee656a58 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 346.847664][ T7928] RAX: ffffffffffffffda RBX: 00000000000548d3 RCX: 000000000045ad07 [ 346.855669][ T7928] RDX: 0000000000402f50 RSI: 0000000000000002 RDI: 00007ffdee656b00 [ 346.863687][ T7928] RBP: 00000000000003de R08: 000000000000c802 R09: 0000000000000010 [ 346.871688][ T7928] R10: 000000000000000a R11: 0000000000000206 R12: 00007ffdee657b90 [ 346.879691][ T7928] R13: 0000000001fb2940 R14: 0000000000000000 R15: 00007ffdee657b90 [ 346.887706][ T7928] [ 346.890042][ T7928] The buggy address belongs to the page: [ 346.895707][ T7928] page:ffffea0001bc79c0 count:2 mapcount:0 mapping:ffff88821b966a98 index:0x462 [ 346.904744][ T7928] def_blk_aops [ 346.904756][ T7928] flags: 0x1fffc000000203a(referenced|dirty|lru|active|private) [ 346.915857][ T7928] raw: 01fffc000000203a ffffea0001bd0508 ffff888098c83b70 ffff88821b966a98 [ 346.924466][ T7928] raw: 0000000000000462 ffff8880526b25e8 00000002ffffffff ffff8880615eec80 [ 346.933056][ T7928] page dumped because: kasan: bad access detected [ 346.939481][ T7928] page->mem_cgroup:ffff8880615eec80 [ 346.944776][ T7928] [ 346.947105][ T7928] Memory state around the buggy address: [ 346.952766][ T7928] ffff88806f1e7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 346.960848][ T7928] ffff88806f1e7f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 346.968931][ T7928] >ffff88806f1e8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 346.977000][ T7928] ^ [ 346.981086][ T7928] ffff88806f1e8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 346.989262][ T7928] ffff88806f1e8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 346.997332][ T7928] ================================================================== [ 347.005411][ T7928] Disabling lock debugging due to kernel taint [ 347.016509][ T7928] Kernel panic - not syncing: panic_on_warn set ... [ 347.022269][T16982] kobject: 'loop0' (00000000eea557ff): kobject_uevent_env [ 347.023156][ T7928] CPU: 0 PID: 7928 Comm: syz-executor.2 Tainted: G B 5.1.0-rc4+ #59 [ 347.033816][T16982] kobject: 'loop0' (00000000eea557ff): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 347.039560][ T7928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.039564][ T7928] Call Trace: [ 347.039588][ T7928] dump_stack+0x172/0x1f0 [ 347.039604][ T7928] panic+0x2cb/0x65c [ 347.039617][ T7928] ? __warn_printk+0xf3/0xf3 [ 347.039632][ T7928] ? __ext4_expand_extra_isize+0x16c/0x240 [ 347.039645][ T7928] ? preempt_schedule+0x4b/0x60 [ 347.039669][ T7928] ? ___preempt_schedule+0x16/0x18 [ 347.092485][ T7928] ? trace_hardirqs_on+0x5e/0x230 [ 347.097529][ T7928] ? __ext4_expand_extra_isize+0x16c/0x240 [ 347.103347][ T7928] end_report+0x47/0x4f [ 347.107518][ T7928] ? __ext4_expand_extra_isize+0x16c/0x240 [ 347.110974][ T3876] kobject: 'loop3' (00000000407a4df7): kobject_uevent_env [ 347.113352][ T7928] kasan_report.cold+0xe/0x40 [ 347.113370][ T7928] ? __ext4_expand_extra_isize+0x16c/0x240 [ 347.113382][ T7928] check_memory_region+0x123/0x190 [ 347.113395][ T7928] memset+0x24/0x40 [ 347.113408][ T7928] __ext4_expand_extra_isize+0x16c/0x240 [ 347.113425][ T7928] ext4_mark_inode_dirty+0x6e9/0x940 [ 347.113445][ T7928] ? ext4_expand_extra_isize+0x550/0x550 [ 347.124022][ T3876] kobject: 'loop3' (00000000407a4df7): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 347.125236][ T7928] ? ___might_sleep+0x163/0x280 [ 347.125252][ T7928] ? __might_sleep+0x95/0x190 [ 347.125270][ T7928] ? ext4_journal_check_start+0x188/0x230 [ 347.125291][ T7928] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 347.189543][ T7928] ? __ext4_journal_start_sb+0x12d/0x4a0 20:41:47 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec", 0x3}, {0x0}], 0x2}, 0x8005) write$P9_RATTACH(r4, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x40, [0x10001, 0x0, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x6, 0x5, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x3, 0x2, 0x3, 0x4, 0xe, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x5, 0x3, 0x7ff, 0x8a79, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x1, 0x3ff, 0x1, 0x9, 0x100000000, 0x0, 0x9, 0x9, 0x8, 0x0, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x8, 0x9, 0x7, 0x1, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x2, 0xffff, 0x7fff, 0x0, 0x5, 0x0, 0x1000, 0x2, 0x1eb4d8e0, 0x1, 0x5, 0x1, 0x0, 0x7ff, 0xe184, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x5, 0xfffffffffffffeff, 0x1326d155, 0xffff, 0x3ff, 0x1, 0x2, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x9, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x1, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x2, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x4, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x8001, 0x3, 0x10000, 0x4, 0x80, 0x6b63, 0x4b, 0x9c6, 0xa2d, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x2, 0x9, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x81, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x5, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7, 0x3f]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) [ 347.195196][ T7928] ext4_dirty_inode+0x8f/0xc0 [ 347.199887][ T7928] ? ext4_setattr+0x2450/0x2450 [ 347.204749][ T7928] __mark_inode_dirty+0x919/0x1290 [ 347.209873][ T7928] ? current_time+0xd8/0x140 [ 347.214477][ T7928] generic_update_time+0x21c/0x370 [ 347.219602][ T7928] ? file_remove_privs+0x480/0x480 [ 347.224729][ T7928] touch_atime+0x23e/0x2a0 [ 347.229164][ T7928] ? atime_needs_update+0x5f0/0x5f0 [ 347.234372][ T7928] ? mntget+0x41/0x50 [ 347.238363][ T7928] trailing_symlink+0x2d4/0x970 [ 347.243220][ T7928] path_mountpoint+0x868/0x1e60 [ 347.248084][ T7928] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 347.254342][ T7928] ? path_openat+0x46e0/0x46e0 [ 347.259125][ T7928] ? cache_grow_end+0xa4/0x190 [ 347.263907][ T7928] filename_mountpoint+0x190/0x3c0 [ 347.269074][ T7928] ? filename_parentat.isra.0+0x410/0x410 [ 347.274829][ T7928] ? __phys_addr_symbol+0x30/0x70 [ 347.279876][ T7928] ? __check_object_size+0x3d/0x42f [ 347.285107][ T7928] ? strncpy_from_user+0x2a8/0x380 [ 347.290247][ T7928] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 20:41:47 executing program 4: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @loopback}, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000200)=0xe8) syz_mount_image$erofs(&(0x7f0000000500)='erofs\x00', &(0x7f0000000800)='./file0\x00', 0x0, 0x1, &(0x7f0000000880)=[{&(0x7f0000000840)="0d157f5d18bab58ec5c558fc4c6ea5b7ba19e77d77c20eb8812c125b36ca98ee7654f2eae5bd11ba35ae5e7fefb0bbef87a30d864a7f41c767424daa4011c1f4", 0x40, 0x5}], 0x1000, &(0x7f00000009c0)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}], [{@smackfsdef={'smackfsdef', 0x3d, '*trusted%ppp0GPL'}}]}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000700)={@in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x22}, 0x4}, {&(0x7f00000005c0)=""/28, 0x1c}, &(0x7f00000006c0), 0x1}, 0xa0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000380)={{{@in=@dev, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000000480)=0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="ffff3fff03ffffff0000000003000000e0040001ac1c14bbac1414bb"], 0x1c) syz_extract_tcp_res$synack(&(0x7f0000000540), 0x1, 0x0) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r1, r2, r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffff12e, 0xa, 0x9, 0x1, "6f8ba4b98879c9ba466b6c01c19b5a871a5b8837f92a5b136cfcf6a7158050c0069622878ea8fb82095b54eafaa436680e95b615167e0f0d8d3f28fa224e6def", "21942ce1ac358b54c5a9d6f66f553ceda17037465d14227d6b10f38981bb51d1", [0xb6, 0x1f]}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 347.296590][ T7928] ? getname_flags+0x277/0x5b0 [ 347.301373][ T7928] user_path_mountpoint_at+0x3a/0x50 [ 347.306692][ T7928] ksys_umount+0x167/0xf00 [ 347.311132][ T7928] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 347.317383][ T7928] ? __detach_mounts+0x320/0x320 [ 347.322334][ T7928] ? kasan_check_write+0x14/0x20 [ 347.327282][ T7928] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 347.332752][ T7928] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 347.338226][ T7928] ? do_syscall_64+0x26/0x610 [ 347.342916][ T7928] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 347.348994][ T7928] ? do_syscall_64+0x26/0x610 [ 347.353692][ T7928] ? lockdep_hardirqs_on+0x418/0x5d0 [ 347.358994][ T7928] __x64_sys_umount+0x54/0x80 [ 347.363699][ T7928] do_syscall_64+0x103/0x610 [ 347.368307][ T7928] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 347.374206][ T7928] RIP: 0033:0x45ad07 [ 347.378116][ T7928] Code: 44 00 00 b8 08 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 347.397733][ T7928] RSP: 002b:00007ffdee656a58 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 347.406161][ T7928] RAX: ffffffffffffffda RBX: 00000000000548d3 RCX: 000000000045ad07 [ 347.414146][ T7928] RDX: 0000000000402f50 RSI: 0000000000000002 RDI: 00007ffdee656b00 [ 347.422126][ T7928] RBP: 00000000000003de R08: 000000000000c802 R09: 0000000000000010 [ 347.430108][ T7928] R10: 000000000000000a R11: 0000000000000206 R12: 00007ffdee657b90 [ 347.438181][ T7928] R13: 0000000001fb2940 R14: 0000000000000000 R15: 00007ffdee657b90 [ 347.446985][ T7928] Kernel Offset: disabled [ 347.451323][ T7928] Rebooting in 86400 seconds..