p_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f0000000480)=""/8) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000240)={0x7, 0x0, 0x10001, 0x8}) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000280)={0x9, r3, 0x0, 0x7}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f00000003c0)={0xff, 0x9, 0x30000000, 0xa543, 0x93, 0x10001}) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f0000000340)={0xffff, [0x7, 0x200, 0x7ff, 0x1, 0x6, 0x100, 0xea, 0xb027, 0x8, 0x9, 0x6, 0x401, 0x401, 0x7, 0x5, 0x9, 0x7, 0x3ff, 0x200, 0x746f, 0x10001, 0xffffffff00000000, 0x8, 0x7, 0x3, 0x2, 0x5, 0x9, 0x2e5977d7, 0x9, 0x72, 0x3, 0xffff, 0x0, 0x1, 0x7fff, 0x800000000000008, 0x1f, 0x9, 0x2, 0xd0, 0xa10, 0x100000001, 0x8, 0x200, 0x6, 0x1, 0x7f], 0xd}) sendfile(r1, r2, 0x0, 0x12) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000440)='/dev/video36\x00', 0x2, 0x0) [ 1279.918167][ T3509] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 [ 1279.994644][ T3525] EXT4-fs (sda1): Unrecognized mount option "journa-_checksum" or missing value 11:59:18 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x80044d76, &(0x7f00000004c0)) 11:59:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x4) 11:59:18 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x2000, 0x0) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000280)=0x10000000000000, &(0x7f00000002c0)=0x4) r3 = openat$cgroup_ro(r0, &(0x7f0000000340)='io.stat\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x12) getsockopt$XDP_MMAP_OFFSETS(r3, 0x11b, 0x1, &(0x7f0000000380), &(0x7f0000000300)=0x60) 11:59:20 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 11:59:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journa._checksum'}]}) 11:59:20 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x4}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:20 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x12) 11:59:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20ncci\x00', 0x380, 0x0) ioctl$VHOST_SET_VRING_ADDR(r2, 0x4028af11, &(0x7f0000000440)={0x1, 0x0, &(0x7f0000000280)=""/11, &(0x7f00000002c0), &(0x7f0000000340)=""/231, 0x1}) r3 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4) 11:59:20 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x80044df9, &(0x7f00000004c0)) 11:59:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4) 11:59:20 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) sendfile(r1, r2, 0x0, 0x12) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f0000000240)={0x9a3, [0x690, 0x5, 0x1f, 0x3a, 0x1f, 0xfffffffffffffffd, 0x6, 0x0, 0x9, 0x2, 0x800, 0xffffffff, 0x3, 0x7, 0x0, 0xfd, 0xfe8a, 0x9, 0x1000, 0x7, 0x6, 0x9, 0xc0d, 0x4, 0x2e60000000000000, 0x100000001, 0x7, 0x7, 0x10001, 0x400, 0x1, 0x1f, 0x5, 0x4, 0x88, 0x382, 0x81, 0x6, 0xac1, 0x8, 0x3ff, 0x1ff, 0x6, 0x1, 0x7fff, 0x4, 0x25f9000000, 0x100], 0xf}) [ 1282.798780][ T3552] EXT4-fs (sda1): Unrecognized mount option "journa._checksum" or missing value 11:59:20 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 1282.902712][ T3550] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000004, 11:59:20 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x12) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x800, 0x7fff, 0x4f, 0x9, 0xfa, 0x200}) 11:59:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000002c0)=0x0) r3 = dup3(r1, r0, 0x80000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r2, r3, 0x0, 0x1df, &(0x7f0000000300)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0xffffffffffffffff}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000280)='io.stat\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x4) connect$llc(r6, &(0x7f0000000240)={0x1a, 0x30d, 0x3f, 0xffffffffffff7fff, 0x8, 0x2}, 0x10) [ 1282.946286][ T3566] EXT4-fs (sda1): Unrecognized mount option "journa._checksum" or missing value 11:59:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journa0_checksum'}]}) 11:59:20 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x5}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:21 executing program 5: userfaultfd(0x80800) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000240)=0x2) sendfile(r1, r2, 0x0, 0x12) 11:59:21 executing program 0: syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000050000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306", 0x5c}]) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:59:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) r4 = getpgid(0xffffffffffffffff) sched_getaffinity(r4, 0x8, &(0x7f0000000240)) sendfile(r2, r3, 0x0, 0x4) [ 1283.203893][ T3581] EXT4-fs (sda1): Unrecognized mount option "journa0_checksum" or missing value 11:59:21 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x12) [ 1283.273439][ T3586] loop0: [POWERTEC] p1 p2 [ 1283.291431][ T3586] loop0: p1 size 6553600 extends beyond EOD, truncated [ 1283.337533][ T3586] loop0: p2 start 82837517 is beyond EOD, truncated [ 1283.413689][ T3586] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 1283.549206][ T3586] loop0: [POWERTEC] p1 p2 [ 1283.557521][ T3586] loop0: p1 size 6553600 extends beyond EOD, truncated [ 1283.569210][ T3586] loop0: p2 start 82837517 is beyond EOD, truncated [ 1283.723447][ T8058] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 11:59:21 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x80045002, &(0x7f00000004c0)) 11:59:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r2, r2, 0x0, 0xffffffffffffffe1) ioctl$TIOCMBIS(r3, 0x5416, &(0x7f0000000240)) 11:59:21 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x12) setsockopt$llc_int(r2, 0x10c, 0xf, &(0x7f0000000240)=0x9, 0x4) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r2, 0x10f, 0x84, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 11:59:21 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x6}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journaL_checksum'}]}) 11:59:21 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000180)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x8cce, 0x0, 0x0, 0x0, 0x0, 0x7f}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x1ff}) 11:59:21 executing program 5: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x80, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0x1, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000340)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xc7\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1bJ\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf5:y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdfNJDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x06$\x1f\xfeKU\xb5\xe2\xcc\xcc\xfc\xd1EX<\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x12) 11:59:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = gettid() ioprio_get$pid(0x2, r2) r3 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4) 11:59:21 executing program 0: clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) stat(0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x400000, 0xca}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:59:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000005380)=[{{&(0x7f00000003c0)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f0000000440)=""/192, 0xc0}, {&(0x7f00000002c0)=""/49, 0x31}], 0x2, &(0x7f0000000500)=""/81, 0x51}, 0x7}, {{&(0x7f0000000580)=@un=@abs, 0x80, &(0x7f0000000640)=[{&(0x7f0000000600)=""/28, 0x1c}], 0x1, &(0x7f0000000680)=""/142, 0x8e}, 0x2}, {{&(0x7f0000000740)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000cc0)=[{&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f00000008c0)=""/46, 0x2e}, {&(0x7f0000000900)}, {&(0x7f0000000940)=""/70, 0x46}, {&(0x7f00000009c0)=""/6, 0x6}, {&(0x7f0000000a00)=""/173, 0xad}, {&(0x7f0000000ac0)=""/95, 0x5f}, {&(0x7f0000000b40)=""/128, 0x80}, {&(0x7f0000000bc0)=""/224, 0xe0}], 0x9, &(0x7f0000000d80)=""/138, 0x8a}, 0x5}, {{0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000000e40)=""/7, 0x7}, {&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/180, 0xb4}, {&(0x7f0000001f40)=""/179, 0xb3}, {&(0x7f0000002000)=""/195, 0xc3}], 0x5, &(0x7f0000002180)=""/87, 0x57}, 0xffff}, {{&(0x7f0000002200)=@pptp, 0x80, &(0x7f0000002440)=[{&(0x7f0000002280)=""/123, 0x7b}, {&(0x7f0000002300)=""/101, 0x65}, {&(0x7f0000002380)=""/125, 0x7d}, {&(0x7f0000002400)=""/39, 0x27}], 0x4}, 0x7fff}, {{&(0x7f0000002480)=@generic, 0x80, &(0x7f0000002800)=[{&(0x7f0000002500)=""/174, 0xae}, {&(0x7f00000025c0)=""/217, 0xd9}, {&(0x7f00000026c0)=""/52, 0x34}, {&(0x7f0000002700)=""/57, 0x39}, {&(0x7f0000002740)=""/172, 0xac}], 0x5, &(0x7f0000002880)=""/110, 0x6e}, 0x1}, {{&(0x7f0000002900)=@ax25={{0x3, @rose}, [@remote, @remote, @rose, @bcast, @default, @null, @netrom]}, 0x80, &(0x7f0000003d40)=[{&(0x7f0000002980)=""/220, 0xdc}, {&(0x7f0000002a80)=""/4096, 0x1000}, {&(0x7f0000003a80)=""/35, 0x23}, {&(0x7f0000003ac0)=""/21, 0x15}, {&(0x7f0000003b00)=""/46, 0x2e}, {&(0x7f0000003b40)=""/175, 0xaf}, {&(0x7f0000003c00)=""/241, 0xf1}, {&(0x7f0000003d00)}], 0x8, &(0x7f0000003dc0)=""/4096, 0x1000}, 0xfff}, {{&(0x7f0000004dc0)=@un=@abs, 0x80, &(0x7f0000005080)=[{&(0x7f0000004e40)=""/168, 0xa8}, {&(0x7f0000004f00)=""/243, 0xf3}, {&(0x7f0000005000)=""/120, 0x78}], 0x3}, 0x2}, {{&(0x7f00000050c0)=@alg, 0x80, &(0x7f0000005240)=[{&(0x7f0000005140)=""/247, 0xf7}], 0x1, &(0x7f0000005280)=""/227, 0xe3}, 0x8}], 0x9, 0x20, &(0x7f00000055c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r3, 0x402c5342, &(0x7f0000000240)={0x9, 0x100000000, 0x685, {0x0, 0x989680}, 0x5ba, 0x1}) ioctl$KVM_PPC_GET_SMMU_INFO(r3, 0x8250aea6, &(0x7f0000005640)=""/145) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='/\x10\x1c\r\xe2\xab\x00\x00\x00\x00\x00\x00\x00\x00\x9e\xe8\x00\x00\x00\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x8) socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000900)=ANY=[@ANYBLOB="f7ff9b79", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000003d00)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000005600)={0x40, 0x8, 0x660, 0xfffffffffffffffd, r7}, 0x10) sendfile(r5, r6, 0x0, 0x4) 11:59:21 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x12) 11:59:22 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x7}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:22 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x80045005, &(0x7f00000004c0)) 11:59:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journau_checksum'}]}) 11:59:22 executing program 0: fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="000207007fffffff10001c14f063905b580b50eb2fafb52a832246e4568bc8e70d65254032614cf908000000a54ca10a0f80f6504c87f158ad45e6c5518f266a0131"], 0x1, 0x1000000000000) clone(0x20000102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000000400000050032200c0010000f0000000f0000000f000000000000000b8020000b8020000b8020000b8020000b802000004"], 0x1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) 11:59:22 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/s\x00z0\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000340)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r1, r0, 0x0, 0x12) 11:59:22 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x8}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x400, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000340)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x6, @empty, 0x9}, r2}}, 0x30) syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x99bd, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r5 = openat$cgroup_ro(r3, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x4) [ 1285.085676][ T3655] EXT4-fs: 4 callbacks suppressed [ 1285.085689][ T3655] EXT4-fs (sda1): Unrecognized mount option "journau_checksum" or missing value 11:59:23 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs={0x1, 0x0, 0x4e21}, 0x6e) sendfile(r1, r2, 0x0, 0x12) 11:59:23 executing program 0: r0 = memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000040)={0x0, 0x0, 0x0, 'queue0\x00', 0x1f}) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x901) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 11:59:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4) 11:59:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal\nchecksum'}]}) 11:59:23 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\xfc', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r2, 0x810c5701, &(0x7f0000000340)) r3 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) sendfile(r1, r3, 0x0, 0x12) setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000002c0), 0x4) 11:59:23 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x9}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1285.323192][ T3695] EXT4-fs (sda1): Unrecognized mount option "journal [ 1285.323192][ T3695] checksum" or missing value [ 1285.458344][ T3705] EXT4-fs (sda1): Unrecognized mount option "journal [ 1285.458344][ T3705] checksum" or missing value [ 1285.548917][ T3701] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 11:59:24 executing program 0: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x2}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x9) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x30, r4, 0x0, 0x70bd2a, 0x25dfdbfc, {{}, 0x0, 0x4108, 0x0, {0x14, 0x18, {0x9, @bearer=@l2={'ib', 0x3a, 'bond0\x00'}}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4008000}, 0x40) r5 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x4) fadvise64(r1, 0x0, 0x69, 0x3) 11:59:24 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x10}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:24 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x80045006, &(0x7f00000004c0)) 11:59:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal%checksum'}]}) 11:59:24 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='notify_on_release\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r1, r0, 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x82000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5b170004", @ANYRES16=r3, @ANYBLOB="00022dbd7000fcdbdf25010000001400020008000600200000000800030003000000"], 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 1286.283305][ T3718] EXT4-fs (sda1): Unrecognized mount option "journal%checksum" or missing value 11:59:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4) 11:59:24 executing program 5: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) socket$rxrpc(0x21, 0x2, 0xa) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x800, 0x0) syz_emit_ethernet(0x1e, &(0x7f0000000480)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @empty, [], {@can={0xc, {{0x8, 0x7, 0x3, 0x20}, 0x4, 0x2, 0x0, 0x0, "f80359ccc6137f40"}}}}, &(0x7f00000004c0)={0x0, 0x1, [0x231, 0xa06, 0x66c, 0x347]}) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000240)={0x0, 0x7, 0x7f, 0x2}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000002c0)={0x0, 0xcc2c}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000380)={r2, 0x2, 0x40, 0x6, 0x8, 0xffffffffffff0000, 0x5, 0x4c931664, {r3, @in6={{0xa, 0x4e23, 0x9, @empty, 0x1}}, 0x76b20d97, 0x7, 0x6ec, 0x7f, 0x100000000}}, &(0x7f0000000440)=0xb0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r0, r4, 0x0, 0x12) [ 1286.408307][ T3719] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000010, 11:59:24 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x2, 0x2) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000280), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rt_sigaction(0x36, &(0x7f00000003c0)={&(0x7f00000002c0)="c401ab2a1d00000000a20200000000000000c4824dbbb3fc000000c46179106717c4837d6bfd72410ff6073626450f5be4460f973b0fabd2c422f9adea", {0x7}, 0xc8000000, &(0x7f0000000340)="3e66410fc24c82c0ab8f0978c69101000000c461b65fbfe8000000c4027d180736400fe8a732233333c4c2bd99cbc4e2790eda8f0920913cc9c4812d670739af00000000"}, 0x0, 0x8, &(0x7f0000000400)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4) 11:59:24 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000380)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) openat$cgroup_ro(r0, &(0x7f0000000340)='cpuset.effective_cpus\x00', 0x0, 0x0) sendfile(r1, r0, 0x0, 0x1009c593c8) 11:59:24 executing program 0: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x2}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journalhchecksum'}]}) 11:59:24 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x2d}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x0, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4) alarm(0x2) [ 1286.649632][ T3749] EXT4-fs (sda1): Unrecognized mount option "journalhchecksum" or missing value [ 1286.775296][ T3758] EXT4-fs (sda1): Unrecognized mount option "journalhchecksum" or missing value 11:59:25 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x80045007, &(0x7f00000004c0)) 11:59:25 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x12) 11:59:25 executing program 0: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x2}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-monitor\x00', 0xc000, 0x0) accept$nfc_llcp(r3, &(0x7f0000000280), &(0x7f0000000300)=0x60) sendfile(r2, 0xffffffffffffffff, 0x0, 0x4) ioctl$SG_GET_ACCESS_COUNT(r3, 0x2289, &(0x7f0000000340)) 11:59:25 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_\nhecksum'}]}) 11:59:25 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x12) 11:59:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000003100)={r1}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000003180)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f0000003240)={&(0x7f0000003140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000003200)={&(0x7f00000031c0)={0x1c, r4, 0x10, 0x70bd27, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x810) r5 = openat$cgroup_int(r2, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) recvmmsg(r0, &(0x7f0000002e40)=[{{&(0x7f0000000400)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0x80, &(0x7f0000001700)=[{&(0x7f00000002c0)=""/57, 0x39}, {&(0x7f0000000480)=""/186, 0xba}, {&(0x7f0000000540)=""/20, 0x14}, {&(0x7f0000000580)=""/209, 0xd1}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000001680)}, {&(0x7f00000016c0)=""/25, 0x19}], 0x7, &(0x7f0000001780)=""/143, 0x8f}, 0x1}, {{&(0x7f0000001840)=@x25={0x9, @remote}, 0x80, &(0x7f00000019c0)=[{&(0x7f00000018c0)=""/218, 0xda}], 0x1}, 0x5}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000001a00)=""/102, 0x66}, {&(0x7f0000001a80)=""/29, 0x1d}, {&(0x7f0000001ac0)=""/117, 0x75}, {&(0x7f0000001b40)=""/113, 0x71}, {&(0x7f0000001bc0)=""/82, 0x52}, {&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000002c40)=""/232, 0xe8}], 0x7, &(0x7f0000002dc0)=""/76, 0x4c}, 0xfffffffffffffffa}], 0x3, 0x40000040, 0x0) r7 = openat$cgroup_ro(r2, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000032c0)='./file1\x00', 0x80, 0x100) mkdir(&(0x7f0000003300)='./file1\x00', 0x4) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r7, 0x84, 0x13, &(0x7f0000000240)={0x0, 0x784}, &(0x7f0000000280)=0x8) mknod(&(0x7f0000003280)='./file0\x00', 0xc000, 0x1) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f0000000340)={r8, @in={{0x2, 0x4e23, @loopback}}}, 0x84) sendfile(r5, r7, 0x0, 0x4) r9 = syz_genetlink_get_family_id$net_dm(&(0x7f0000003000)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f00000030c0)={&(0x7f0000002fc0), 0xc, &(0x7f0000003080)={&(0x7f0000003040)={0x14, r9, 0x100, 0x70bd26, 0x25dfdbfc, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000081}, 0x40080) unlink(&(0x7f0000001680)='./file0\x00') accept$unix(r6, &(0x7f0000002f00), &(0x7f0000002f80)=0x6e) [ 1287.423921][ T3773] EXT4-fs (sda1): Unrecognized mount option "journal_ [ 1287.423921][ T3773] hecksum" or missing value 11:59:25 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40800, 0x0) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000080)=0xc9) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video36\x00', 0x2, 0x0) sendfile(r1, r2, 0x0, 0x80) fdatasync(r1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f00000000c0)=0xfffffffffffffffc, &(0x7f0000000100)=0x4) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000300)='cpuset.sFh_level\x00\x1f\x00\x00\x00\x02\x00\x00\x00\x00\xfe\r\xa0\xb4\x86\xb6\xe7\x1c\xa5\r8\xf0\xde*s&\x00\x00\x00\x00', 0x2, 0x0) r5 = openat$cgroup_ro(r3, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x4) 11:59:25 executing program 0: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x10}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1287.658107][ T3773] EXT4-fs (sda1): Unrecognized mount option "journal_ [ 1287.658107][ T3773] hecksum" or missing value 11:59:25 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) 11:59:25 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x4c}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:26 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x8004500b, &(0x7f00000004c0)) 11:59:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_#hecksum'}]}) 11:59:26 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x12) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) 11:59:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x0, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x0, 0x1000, 0x2b, &(0x7f0000000340)="0f3d3c46ed103f38a987396728ce3ed021ad674c225fbeb7b050c7091470de40f8f4b3ada1b5d303340ebb5f8fc26d8548dd4e678ddc003dc0e21812e0d2b89df623afbbc7a09bcfe609994116f3255256ec22845d563eef03c255c0ba8a3be64f96343d56c0ca03b3afbc716925c8ba7854545e429938ccb78787c17c565479dac7ef648e5ccb4d1dd338713101dc2af8e3113773b6778a7e48d44907bbf81bca8676f09eca354914c0d847c98a32a25bbed61561ee444d284e1806ed36b107b6e6e6812363b1613e2ef2412946c746d68ae0e7cc8c54ce2c62fcc8947f5a3f27b377d1e657f69097661afd7043212007479434a596a1ced4fc414151b2daad47400a26feaafe4aa193bef835a5c481ddf3f8128d133825ab09523d83b9a222349000616a1dfa5eb5b4c804a5dc2a9f4785213f255a0f647f480346e8f471cce1e40a70737fdf9fa366bde0b5c348f76685cb3108eac4814232883459ba54007aeb279bc0c5478ca32c80b9f4469c67859cc679d7dce031728302355aa56a41b16f0207814f405f89ce6228dfabcd4c94093928f969bb857dc4cfbccbb6934cf06159b3dbcaa784e683c4514be85ee50ac2579bd416ad95c9252703e12066aeea3e5e34a6cc01d32edc38a6dbca99a83783cd2e4726727dcfc3cb92fa4c65297e1ff1e956ca934c1f7092761cf6215f3fdeb285719addad77b40b273660224c932e4ee8b17da520d6074b8a865f7660aba532502b9b0b00e32767a134f4ba5dcc16e24d47d76c6f77db321236ea5132fe20a8a527ac45d0cef3f8d0902381d99a7b4d667815c306fa55023f90caf489f38ca185b591c4e5098a288ff3e7095735a3cbb84248226d087b99b102978a76aee23749fa7e7df8dd6a359429d287945c394a672faae015402ee292f7c82ab21f00d790e3818c0041a1e042fa9748c46f44c500c89438a18e1705e6b0f009ea3813e5b70919b9aa463c447edc87ceae7c3effad5b9e19614485979029a9dadf033e9ca0cdde99b95ab59eb5fc2f44737026e75b8a127490500834fd94d6775e0d8f57649fce541194f3b99a321512ece5b5ce504fa7e4f26d50fcd5b168037e0b6a44b0d7f5cacd6fef0d39c137662c47912755b4ddfd492ed56891e7fc3b90e8adfdafd99ca599d173a4c791912a79e675f28efc1d3cdd36e8f06914b24389202eb0f2fc19e498023c9654f16a783bcafdb2a02fb4dc6578c7825e35b869e74b2db559cc7a6dcd765bb81c6aa5babe07ae43a167f5dd32aca56fdb715472ce1a7d786fc13e0e605e4375cb8669940c9629704b0fc2213067fe829606428eaf493b75cdea8d167ad4164b5fa005f084d55faea67c51a55dd7c6f639c578ee534a42b7d68a3bd08be447bbf13593eb8c4f05451eef0e3d2287bcdd7d61ca7cd87ca94fe1c44597f25520c4ffb4282368bf6742322e46523b955945048290fa1cae3d50a366fd3dad179454def51817edbc699eea7dd8c8f9a9a895e8035adf9eaf14bf6e7c275acc0cfa6862de4d25bab0da9654796ce8c40964eac0beb3f0695798fa6429dacab492421026c936ffd7b76f176170a13abb9f4ec71cb368cb24e1fc4ede3c3ab4bf8ce069b753f01536fe2d7afd3038e9e5a9a96def07bbd8b8dfaf546b4eacc5ab25a476fffef32e0c4a67e3f085854408b5618305967af3889838af26ddd3a82aba908e757d0f9ac45215f4b8160dfa1ef66dc74ef72b7b9f660da9a824f94982c70c5b1f0c4c0d4a8c94a9e6806a5010bac7d9b3ba60450b8c2795299f7c0e7ec368ffd714a98eec1c41aa1875fce726095a0775f0bd125b7ba51e4c4be8f19978dad7218c513e775aadebab417f5e8233ae257d88d0f81a2c59096cc8169123ae485e911747cd50c4976f4a81f1b8abd541f7fd3955ac3249073e3522ce7e7db7c2ff1cd6d09fd61f26e84a0b0dcc38048e17c28ecdb50a41fb20ee573b6fa9aaad8788541a9412b6085202bb3984e295f47151b38f80fee3fbdc5499d5d1bb594d71ff803134be2dd13e51898a8afb94160d8ab2427c4e3bfa59e00a6a1d47454cb5756f0eb6bd864ad8dedab93820f23deec42de7f7e5f2076fc03384da717aae8a32f4b1ea834ea9af109e022cf62836e7cd747e1b27c804046b258ecbaf542f92601c4e6cdb34fc72a4ecc1ac767d46ff0519a359d827920f94a58b77bb3d55baa77ae141e8bb294b9a9ef145c85f6e139d9a7aa488b9128476e7110b43caefa05a10735c481f7278f97a063919e08cc5bf5c94204afa1478339019e30dcb9a41ab255cbe6b9a8c3a6d7b750a14d6fdc782add1ec4e146fc94f4849bbe4cd586d0cdba6bb7273e0e59dc7203418523f958be234b844267677cf2a160690dcfe574f9ed94930d87a5056c0829ada20430e30b2719a8c572835672b543e1d3da53cd7c1b11934be525cc9824425bd950c6969dd3a3398bad42915198f79c5005bf542b4431df5126d059ff81d69841be89e91edcc69c932a214fdbd63ae529b9e36e6c1a28a668facf58af069978010d73428da10d60413e422507794eb67060cbb7d15b468abed1c4a25a1a0aa6d2905a4b1d3f680a7f664d27094e7730dd4bb8e1feaa8c5311d63f905e13822c60aa3a25bbb567ee96fb59b18768984fd82e064da69ea803c8ca42cee307740ec67d20f316838b83911b8d986566d0e82eeae1e53d3eb4847fcff1b0bcfa6cbef93f2d5f5ddd3c0e7cc7d4daeb35943e261b0d1add3b0847ddc95c0f8c1e2c2dbd2d4fb90a54a0c923817af73253fff519c2060e4005247b9b340734175f88c42ac5567cba577bb5b30de41b304f1eed06a1d94bd83724de9a00dd7e44e9d720eb971ada8d1354201f1efc19e75c9d9c3d18ce71ec2228b979b70f39d88475f4268a929e9283ef1c560e98d00f40db1ddccc54da43791ce5d4fecc3fd0ab0b4dea4f5d1e9640c995ab35cdc7da97c12241cb4379862bd79cf51a6747072c0dd9c43bc89039d06d08d3622cf1e94ace776f69c04bfa92731b3e6e25987d922ff024381e57e7ec2c3a8cf9b39d179a8337d42227a8912aa2073635c5377779b356ef1024bb8ce787402598075031ddbea95de344de6683a1be0594476c8b4ed72246f266f2d41f3fb7e9154c95012a4ef8d76137f21ed64b6a61f73852be82f54d54e64a20db5eda05c297d8fbb8b31dd5a9b1962437160e92f3c167c09d3390a400fffa877f13bb7735f18dd01fb552e4f0d10c14b821a661b7b414682210fa3f906e0bc9a905daee2c0d1d81ff1c6659de8a580eb9a4272b018bdb20f4419ca47e9352e2bdf6a2989317801dc8d8375b43a9937862c8101acc8b8fcd49b13012d0dba452464cb87ac7165a432d42012783a7aa24aa5286c5f392cacbf882b2cf74e2ac5decf802c45970932d11bc58a050ffefefb32e66db0c41ac1db7224165d82e6d34e80925217d735cde85eeba80a298021356193aa92665385563b3fa1f439808f083ce7248b95f55ced5139eaf504d301d818c2308723bd42fac8529157608544e859a59ec75ff8f9db98f6b243846db876f9fe349c5b45885f625620714c710e3f163247b5ac89c43062171b6bf1e1ad7b2876b8930920119ee3bd30002308a167968ead9f322ab56bc22061401a67c4bdecd817622233134d187e0911f250702662569da28f5a70b70133e935647ef2b29d2c53ca96085d507aff912f26e74208bb6f82f29c8957729e74d6d3baf4d90847f063221d65032c7933637b216463cb8896eecd48c72ca0cd3909f8bd9bcefc709edd7b325a073c81cfa32efae0e76207cb41200da0986b5884493211b97e350bf962a3bd4ca640a83c87ecc6b283bf3b3120e0b43571190222b697913d4039306e9a0a6def7c3510503c2d77ea517f9bdb6aff225c8fbca2fccfd379db0f57937a180124b2707077ce64a445cf2686ef6d008e1dd148a63a4cecfea59a57767a3213a1f92351791dd53b8b92600eef6f23f549e7d3702342d24ba714a3298ecb4d34cd12b8569d9b16f6b0a5bd747aaa8d3440dfb2ef9e7ef5d9a52a5493e2864c85dab90b6343f00c74f9340df6e4ed54a0b3e2730958a5a94e9e40e833c423228afd34e20c7881426dddb3778f6965f5d223f4f585f5f3ded04c20a250fe0dfa47068afbd671ba9880f32decc6ad6699270ff4333794c0f784dec8326614e4087809d90975337e59b156ed56dee30192a5d308617e7a61bbb5c26769fd29e7a8905a0d60f5fa452e1a04c2561c0fba5cb33113a0c098fa9a564b2b75e58465088c2e1ae43701e0b95952ba4c2990eae591f037f19acf5b20d88e256705871999ff66e1a32783e5dc41257f35a2945d9ebda8965510a3b207ca3f5e933927b19faa18072ace3976d429ac2c598c8233691493c50b93ef944d597a1e5d346d78df2a8f86681152f49f6726163894aa15ce0132637d3bc55a0c7865dae2881f5aa5e7aad3f311ec16d6a972a7e14fca52d0c1bd28e94dce98e383884478347b427c58f55707439d74fdf0c29c91c8b254aa9dd661fab3d8a4a4cde572209e64daba63bd175184b1935226aac50a3a228367fb1493307b13a7552c6b4ac75f25d364b5c3390c8ef8adc437d626ca3485c0d675d9213901c2344e27d8a091528cae98d8e58c1add42679ec8512b13d8ec4fa62999ceb24f8f8529ec6a0b388235894c884f3ddd31430be30d9f41a92741b8397ab49c53bd2aa69b74d263bf6fd302f8a92b98138b20f4ee344229b013d4021b9fcd7496e6713545a8a3873cb01ffc4c6b3946367c0abdf9f29f4a44e323db786d4760ce0e4c9ee19d0dc06eaf0edd286ffb55b5f7589b95980bc5e9d2f7424fefcf7d441754bf617dbe15d1701b17879dd3757f86e9e58f942845b9f2df0976bd37a846a5c2934da21a162f744effda8456e1c43ea3e5189d02f268048bb97a6d463121aa2a5ae2f06793f9cf5e440e652ff69fa8fd561532dfe3d931c41ba688a9b8be0281d77e10577976c9417f07dcffd4f8aabb5bb44254c5673fb926d5a7cc19c3af9d3aec7c91839228bdf5c8b003a344e5cee9367fdac1ea1c83c82f2091b0bc5893ffc0a574083ed20fe949948715914d0359c1a036297fcf292fb62abccc59ab86ba4b3a60b70e3578dd8f4ab9b1ac97c62a8f9862efb1cc9a048e3da32be105d82a968817064fccfdbddbdf4feb8852f328e0071d4263030dad9ad106516659a95f66d5f69fff108397ed68f6f94c7e8d29e90daa17a153a4852c1b63df086e1b373e0ab28679266abe3306439fb9989a61fa73b952abda891d010de8d41d8a99b05d7d78e57a875f31a0244139430ec00104549848e2c3222e05cb8e18446e41e1d99d775817557340739bdfb0fc5c767fc741ade842291eec1ddd3efa87d14f60299ab47563cc19748a92bf1d9e7542ef6197429cbeb4ac24f1dc43331f588c2315a2caa1200fefe87df2599e3fb406573697cc3f3cc392e55e22b5c116548152809a41c87c0c7dc1079cb6d7a99c1324839c657490fb851f0728186b013c1df016faa39a71e656e68ddd7a805d2411bb3735c9c02d918436388f7ca2a8b3f98f9cb36adcb236060556c66919dc874d9894a8fea7b2d4139f36bbdd8de0bdb3d3d18c95e7c7c150f0f16561995b132c1429dd55f7699d02e32c7b6712ae06377bfe08342801b9b7b28cfc629ecb75262f48694361b772caaf206fa2855198cd217ec26a69b9fedaa9ccd9400d9f2d53d17502e2304af75feafeab432655beefc421e258dd5d9128f87174bf", &(0x7f0000000240)=""/43, 0xe3ab}, 0x28) sendfile(r2, r3, 0x0, 0x4) 11:59:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000340)='/dev/adsp#\x00', 0x4, 0x200000) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, r2, 0xc08, 0x70bd2b, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4008894}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup\x00', 0x200002, 0x0) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x2, 0x3, 0x400, 0x2, r4, 0xff}, 0x2c) r5 = openat$cgroup_int(r3, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, &(0x7f00000002c0)=@req={0x6, 0x2ee, 0x0, 0x5}, 0x10) r6 = openat$cgroup_ro(r3, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x4) 11:59:26 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x68}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:26 executing program 0: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x4c}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:26 executing program 5: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000002c0)={0x2, 0x0, 0x4, 0x3, 0x8, 0x4, 0x8, 0x0, 0x0}, &(0x7f0000000340)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x6, 0x5, 0x8200, 0xfc8, 0x1c02, 0xffffffff, 0xfff, 0x1f, r2}, 0x20) sendfile(r0, r1, 0x0, 0x12) 11:59:26 executing program 2: r0 = accept(0xffffffffffffffff, &(0x7f0000000240)=@nl=@unspec, &(0x7f00000002c0)=0x80) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000340)={0x1, {{0x2, 0x4e24, @empty}}}, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r1 = syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0x81, 0x1) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000480)={0x100000000, 0x3, 0x7, 0x9}) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4) syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') ioctl$PPPIOCDISCONN(r1, 0x7439) 11:59:26 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = syz_open_dev$dspn(&(0x7f00000002c0)='/dev/dsp#\x00', 0x3, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') write$P9_RSTAT(r1, &(0x7f0000000500)={0x40c, 0x7d, 0x2, {0x0, 0x405, 0x2, 0x1, {0xd, 0x0, 0x3}, 0x100000, 0x6, 0x7, 0x40, 0xb, 'selinuxeth1', 0x9, '}procppp1', 0x1df, 'io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x1df, 'io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM'}}, 0x40c) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=r2, @ANYBLOB="000426bd7000fbdbdf250d00000008000400300400006000030014000200677265300000000000000000002a492e5309c52378000000140002006261746164763000000000000000000008000800020000001400020003006964676530000000000000000000080008000e000000080003000100000008000600040000000800040000000000"], 0x8c}, 0x1, 0x0, 0x0, 0x80}, 0x40) connect(r0, &(0x7f0000000240)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r5 = openat$cgroup_ro(r3, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x12) 11:59:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_%hecksum'}]}) 11:59:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x108) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000340)={0x0, @vbi={0x1, 0x9, 0x6, 0x7f7f7f7b, [0x7], [0x3, 0xfffffffffffffe00], 0x1}}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4) unlink(&(0x7f0000000240)='./file0\x00') 11:59:27 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x8004500f, &(0x7f00000004c0)) 11:59:27 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x6c}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:27 executing program 0: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x68}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:27 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000240)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4) 11:59:27 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x200440, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) mmap$perf(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000000, 0x3110, r2, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/urandom\x00', 0x103, 0x0) sendfile(r1, r2, 0x0, 0x12) connect$inet(r2, &(0x7f00000002c0)={0x2, 0x4e21, @remote}, 0x10) close(r2) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4, 0x80010, r0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="0bfeffff0100000006000000e09f3f5dc0ca9de63dbebfdb2d0163557b92a3c46ee5a0d577c328f96b07ab2be46d01378888bb209035ae5ea62bac26dc9126a06f97e6eefeda32ad77a2626eb091cae0234ea73e747e292a1d106c311f"]) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r2, 0x28, &(0x7f0000000240)}, 0x10) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000440)={0xe, @output={0x1000, 0x1, {0x20, 0x6}, 0x5}}) 11:59:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_*hecksum'}]}) 11:59:27 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000600)={0x5, 0x6, 0x4, 0x8, 0x10, 0x4, 0x20000000, 0x10001, 0x7f, 0x9, 0x55, 0x3}) getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000580)={&(0x7f00000003c0)={0x1b8, r1, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x78, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xd42}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}]}, @TIPC_NLA_LINK={0x68, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x91}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}]}]}, @TIPC_NLA_BEARER={0xc4, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0xf93f, @rand_addr="4ba7dcc3dd80a9cd104aa9629db7a1ad", 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x7, @local, 0x3}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @rand_addr=0x93}}, {0x14, 0x2, @in={0x2, 0x4e20, @rand_addr=0x2}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x100000000, @mcast2, 0xc4f}}, {0x14, 0x2, @in={0x2, 0x4e23, @rand_addr=0x1}}}}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'lo\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6d99e75}]}]}]}, 0x1b8}, 0x1, 0x0, 0x0, 0x40}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000640)={'syz_tun\x00', 0x0}) sendmsg$can_bcm(r2, &(0x7f0000000780)={&(0x7f0000000680)={0x1d, r3}, 0x10, &(0x7f0000000740)={&(0x7f00000006c0)={0x4, 0x200, 0xff, {0x0, 0x7530}, {}, {0x4, 0x9, 0xe27, 0x8}, 0x1, @canfd={{0x4, 0x0, 0x3f, 0x3}, 0x3e, 0x3, 0x0, 0x0, "d85ed5d04b56c3045e3d44011200ae3fb63286ca574f88a8fbc8dc522ad625ec0dcc9e60efaa9c8b5e72a1f30eb2319b09027e7852558af7972aab256481ce89"}}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) r4 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r0, r4, 0x0, 0x12) 11:59:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4) getsockopt$inet_udp_int(r3, 0x11, 0xa, &(0x7f0000000200), &(0x7f0000000280)=0x4) 11:59:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_+hecksum'}]}) 11:59:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x80, 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f00000002c0)={0x3, 0x0, [{0x257, 0x0, 0x27}, {0x34f, 0x0, 0x4}, {0x937, 0x0, 0x1000}]}) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x4) 11:59:27 executing program 0 (fault-call:8 fault-nth:0): clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:59:27 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x74}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1290.133684][ T3895] EXT4-fs: 11 callbacks suppressed [ 1290.133696][ T3895] EXT4-fs (sda1): Unrecognized mount option "journal_+hecksum" or missing value 11:59:28 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x80045010, &(0x7f00000004c0)) 11:59:28 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000240)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000340)=""/207) r2 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r3 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x12) 11:59:28 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RREAD(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="b3000000750000a800000015ee68b0ef76f866011236489d926d581e0fa25d31cbcbecf8fdcd3114bc18edad2b504518660604000000004073f4a449abb7b29243c311a1cd0d4d756d26ca145ca8d08e70311ff1f95998e20d5753f903f66b1ef2de666c0336bc6e993b2668f81552b402247db94e72ca6f8841955ca95ba0bda94897e3e2ca0bd93718d8c6f8d944a6f0738a22fe98945931244975762d6563db61363f000000941fdcd5370392a935043005"], 0xb3) signalfd(r0, &(0x7f0000000200)={0x4}, 0x8) r1 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x8000, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000280)={0x18, 0xf, 0x1, {{0x1, 0x2}, 0x7}}, 0x18) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4) 11:59:28 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:59:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_-hecksum'}]}) 11:59:28 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x7a}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000280)='/dev/cachefiles\x00', 0x80, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f00000007c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000780)={&(0x7f0000000440)={0x330, r3, 0x208, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8}]}, @TIPC_NLA_LINK={0x15c, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xef}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffd}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xda}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000000}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe92}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffff9}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}]}, @TIPC_NLA_LINK={0x28, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xec}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}]}, @TIPC_NLA_MEDIA={0xc0, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc25}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x60b3}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0x9c, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd7}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x330}, 0x1, 0x0, 0x0, 0x4001}, 0x400c000) r4 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f0000000240)='io.stat\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x4) ioctl$KVM_GET_IRQCHIP(r5, 0xc208ae62, &(0x7f0000000340)) [ 1290.932210][ T3907] EXT4-fs (sda1): Unrecognized mount option "journal_-hecksum" or missing value 11:59:28 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) ioctl$RTC_VL_READ(r2, 0x80047013, &(0x7f0000000240)) sendfile(r1, r2, 0x0, 0x12) 11:59:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r1}) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000280)={0x0, @dev, @local}, &(0x7f00000002c0)=0xc) r5 = openat$cgroup_ro(r2, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000340), &(0x7f0000000380)=0xc) sendfile(r3, r5, 0x0, 0x4) [ 1291.024912][ T3912] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 11:59:28 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8012) [ 1291.084345][ T3925] EXT4-fs (sda1): Unrecognized mount option "journal_-hecksum" or missing value 11:59:29 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xc0}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_.hecksum'}]}) [ 1291.370913][ T3942] EXT4-fs (sda1): Unrecognized mount option "journal_.hecksum" or missing value [ 1291.497325][ T3946] EXT4-fs (sda1): Unrecognized mount option "journal_.hecksum" or missing value 11:59:29 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x80045017, &(0x7f00000004c0)) 11:59:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcs\x00', 0x101040, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000480)={{0xa, 0x4e23, 0xbe, @local, 0x10000}, {0xa, 0x4e23, 0x8, @mcast2, 0x4}, 0x8, [0x2, 0xff, 0x0, 0xb0, 0x4, 0x9, 0x100000001, 0x100]}, 0x5c) r3 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r4 = openat$cgroup_ro(r1, &(0x7f0000000280)='io.stat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4) r5 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x213a, 0x0) setsockopt$inet_group_source_req(r5, 0x0, 0x2f, &(0x7f0000000340)={0x8, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x108) 11:59:29 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e20, @multicast2}}, [0x7, 0x67de27dc, 0x3, 0x5, 0x100, 0x1f, 0x0, 0xffffffff, 0x7, 0x7f, 0x2008000000, 0x100000000, 0x3ff, 0xed, 0xc59]}, &(0x7f0000000180)=0x100) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000001c0)={0x6, 0x1, 0x200, 0x20, 0x80, 0x133, 0x8, 0x7, r2}, &(0x7f0000000240)=0x20) r3 = openat$cgroup_int(r0, &(0x7f0000000340)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) ftruncate(r0, 0x3ff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x1f) 11:59:31 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0xfffffffffffff801, 0x800) ioctl$PPPIOCDISCONN(r1, 0x7439) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x2, 0x200) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000040)={0x7}, 0x4) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:59:31 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x300}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_0hecksum'}]}) 11:59:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$vivid(&(0x7f0000000240)='/dev/video#\x00', 0x3, 0x2) ioctl$VIDIOC_S_PARM(r1, 0xc0cc5616, &(0x7f0000000340)={0x2, @capture={0x1000, 0x0, {0x4, 0x9}, 0x5, 0x9}}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4) 11:59:31 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f0000000240)={0xf000, 0x0, 0x81, 0x4, 0x6}) sendfile(r1, r2, 0x0, 0x12) 11:59:31 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5011, &(0x7f00000004c0)) 11:59:31 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x12) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000240), &(0x7f0000000280)=0x4) 11:59:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={r1, 0x0, 0x1, 0x4, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) r2 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x5, 0x101000) openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x319000, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r2, 0x4010ae68, &(0x7f0000000380)={0x0, 0x10000}) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r5 = openat$cgroup_ro(r3, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) ioctl$CAPI_INSTALLED(r5, 0x80024322) sendfile(r4, r5, 0x0, 0x4) [ 1293.964689][ T3965] EXT4-fs (sda1): Unrecognized mount option "journal_0hecksum" or missing value [ 1294.027654][ T3962] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 11:59:31 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) ioctl$PPPIOCSMRU(r3, 0x40047452, &(0x7f0000000300)=0x1) fcntl$addseals(r1, 0x409, 0xa) ioctl$DRM_IOCTL_INFO_BUFS(r2, 0xc0106418, &(0x7f0000000400)={0x6, 0x8, 0xffffffffffffffff, 0x4, 0x4, 0x2}) write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f0000000280)={0x2, 0x9}, 0x2) sendfile(r1, r2, 0x0, 0x12) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$MISDN_TIME_STAMP(r3, 0x0, 0x1, &(0x7f0000000240), 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r3, 0x402c5342, &(0x7f0000000340)={0x8, 0x418, 0x9, {r4, r5+30000000}, 0x9, 0xffff}) 11:59:31 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x800) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000040)=0x800) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:59:32 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x2, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380)="b2d10310e6149bcedfd55dd84119d6a42f00383f618009d9a7a7f1d22a748d1938bfdd2d6353a210a65a63e739554fff24227360a8370ea17c67c1c1071b0000bae2fd3ee993f922c47768cda97327d483a0669ab2c937b238f0d403bf705be73f1d9d0bb2ed45c7963244b6254395026d6001b2472d69490628576ad211089769b67590641bb86c303896cc2660570370c64a5a6b7f738e35a2d3dce440d2c76ce9a4038fb4853a9ffc76ad73375e681ef54958b3ae6eadc55778475f4b41aee1c97c66fb7f15c8d933c310d53e6a1b", 0xd0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)="28a88c255ca3c2c1bc43d052ecf46b10bd2a", 0x12, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000740)='cifs.idmap\x00', &(0x7f0000000780)={'syz', 0x1}, &(0x7f00000007c0)="c5556d57e2589faf9aaa2d0101c3f2cf5f2e04a7cf3ebb1f6286ca7915e1a1229ed106adfe0ee64a1b42e819f905b9b28efd636044e454fafbcb5fa42c1b52271a1a828e5701b9a8fda501406dc49265cb9acea00f477bce9c83c302fbb2655eae79e28929829e80afaeeecac8", 0x6d, 0xfffffffffffffffb) keyctl$instantiate(0xc, r2, &(0x7f0000000500)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x20, 0x401}, 0x206, r3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x4) ioctl$CAPI_REGISTER(r1, 0x400c4301, &(0x7f0000000340)={0x80000000, 0x32e, 0x9}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000280)=0x200, 0x4) recvmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000840)=@tipc=@id, 0x80, &(0x7f0000001940)=[{&(0x7f00000008c0)=""/102, 0x66}, {&(0x7f0000000940)=""/4096, 0x1000}], 0x2, &(0x7f0000001980)=""/21, 0x15}, 0x10000) [ 1294.084119][ T3980] EXT4-fs (sda1): Unrecognized mount option "journal_0hecksum" or missing value 11:59:32 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_Xhecksum'}]}) 11:59:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) nanosleep(&(0x7f0000000240)={0x77359400}, &(0x7f0000000280)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4) 11:59:32 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x11) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x1010c1, 0x0) 11:59:32 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) socket$packet(0x11, 0x80000000000002, 0x300) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x6eeefdfd, &(0x7f0000000000)) ptrace$cont(0x1f, r0, 0x0, 0x81) [ 1294.304726][ T4002] EXT4-fs (sda1): Unrecognized mount option "journal_Xhecksum" or missing value 11:59:32 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000540)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\a\x00\x00\x00\x00\x00\x00\x00\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x04Dn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000000)='cgroup.clone_children\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x5) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f0000000240)={0x61, 0x8, 0x4, 0x2000000, {}, {0x3, 0xc, 0x80000001, 0x9, 0x9, 0x80000001, "30c0a1d5"}, 0xde2, 0x5, @userptr=0x78, 0x4}) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r3, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x100}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) openat$cgroup_type(r1, &(0x7f0000000180)='cgroup.type\x00', 0x2, 0x0) 11:59:32 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x8010500c, &(0x7f00000004c0)) 11:59:32 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x600}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:32 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./\x04\x00\x8a\x8bn\xf5\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x12) 11:59:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_dhecksum'}]}) 11:59:32 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) r1 = socket(0x10, 0x80a, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e23, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}, @in6={0xa, 0x4e20, 0x4, @loopback, 0x4}, @in={0x2, 0x4e21, @multicast1}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e24, 0xffffffffffffd591, @remote, 0x39}, @in={0x2, 0x4e23, @rand_addr=0x8001}], 0xa4) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:59:32 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000540)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9d\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xce\x83\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x12) 11:59:33 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0xa5a, 0x0) tkill(r0, 0x24) setitimer(0x3, &(0x7f0000000000)={{0x0, 0x2710}, {0x0, 0x2710}}, &(0x7f0000000040)) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x200000, 0x0) r2 = dup(r1) ioctl$SG_GET_TIMEOUT(r2, 0x2202, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) bind$nfc_llcp(r1, &(0x7f0000000140)={0x27, 0x1, 0x2, 0x6, 0x8eb0, 0x1, "712e29fd4e136d7d411e116a21439f17c232d3e4cdcfec00e4936309c8d0f8f1eeec13652b372f89d6dc931b433b67c07669b765406e2b84e363a03aa3681e", 0x2a}, 0x60) socket$caif_stream(0x25, 0x1, 0x3) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) bind$netrom(r2, &(0x7f00000001c0)={{0x3, @bcast, 0x3}, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}, 0x48) ptrace$cont(0x1f, r0, 0x0, 0x0) geteuid() 11:59:33 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x12) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x101200, 0x0) 11:59:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000240)={0x0, {0xc6e, 0xba70, 0x729f6403, 0x100}}) sendfile(r3, r4, 0x0, 0x4) 11:59:33 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x700}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:33 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x1, 0x2) ioctl$VIDIOC_SUBDEV_G_CROP(r0, 0xc038563b, &(0x7f0000000040)={0x0, 0x0, {0x800, 0x80000001, 0x64825864, 0x5747}}) r1 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3d) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 11:59:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_hhecksum'}]}) [ 1295.353895][ T4067] EXT4-fs: 2 callbacks suppressed [ 1295.353905][ T4067] EXT4-fs (sda1): Unrecognized mount option "journal_hhecksum" or missing value [ 1295.480797][ T4075] EXT4-fs (sda1): Unrecognized mount option "journal_hhecksum" or missing value 11:59:34 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x8010500d, &(0x7f00000004c0)) 11:59:34 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000540)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$SIOCGETLINKNAME(r2, 0x89e0, &(0x7f0000000240)={0x4, 0x2}) sendfile(r1, r2, 0x0, 0x12) 11:59:34 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x200, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000140)=0x9) select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = dup(0xffffffffffffff9c) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={[], 0xffff, 0x6, 0xe2, 0xffffffffffffffe0, 0xbdff, r0}) tkill(r0, 0x37) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000180)=r0) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:59:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4) ioctl$VIDIOC_ENCODER_CMD(r3, 0xc028564d, &(0x7f0000000240)={0x3, 0x1, [0xf6, 0xccb, 0x0, 0x0, 0x4e05, 0x5, 0x2, 0x400]}) 11:59:34 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x900}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_ihecksum'}]}) 11:59:34 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x1f, &(0x7f00000002c0)={@mcast1, 0x0}, &(0x7f0000000340)=0x14) getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)=0x0) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@dev={0xfe, 0x80, [], 0x24}, @in=@broadcast, 0x4e24, 0x0, 0x4e20, 0x8, 0xa, 0xa0, 0x20, 0x0, r3, r4}, {0x7, 0xf7, 0x0, 0xfffffffffffffff9, 0xffffffffffff33ee, 0xfffffffffffffffe, 0xa378, 0x7fffffff}, {0x36, 0xfffffffffffffff7, 0x3, 0x6}, 0x4, 0x6e6bba, 0x1, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x4d2, 0x3b}, 0xa, @in6=@ipv4={[], [], @broadcast}, 0x34ff, 0x7, 0x2, 0x5, 0x4, 0x2, 0x8255}}, 0xe8) sendfile(r1, r2, 0x0, 0x12) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000200)={0x2, 0x7ff, 0x20, 0x81c, 0x7ff}) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000240)=0x7ff, 0x4) [ 1296.229308][ T4085] EXT4-fs (sda1): Unrecognized mount option "journal_ihecksum" or missing value 11:59:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x5, 0x2000) pipe(&(0x7f0000000280)={0xffffffffffffffff}) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000340)={0x3, 0x59, "d6823234a8e428cd2d542ac3773f05db81a29648eceb4f30550aa44a7c0acba05a4ede034e267fb59c4c0a1382c5201a61dc1d05972712c911ebfdb4524f3d83d5fb5b67aee951d02da9ec23d6ae2485fd385e6a1ae31f76c7"}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1066d1bb) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) openat$cgroup_ro(r3, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000200)) sendfile(r4, r0, 0x0, 0x2) 11:59:34 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fcntl$setown(r1, 0x8, r0) [ 1296.325218][ T4089] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 11:59:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fremovexattr(r0, &(0x7f0000000240)=@random={'system.', ')-+system\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4) 11:59:34 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/mixer\x00', 0x8000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000380)={0x10001, 0x356, 0x7, 'queue1\x00', 0x4}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x12) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4, 0x4}}, 0x10) setsockopt$inet6_tcp_buf(r3, 0x6, 0x0, &(0x7f0000000340), 0x0) [ 1296.384860][ T4105] EXT4-fs (sda1): Unrecognized mount option "journal_ihecksum" or missing value 11:59:34 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xf19}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1296.652030][ T4121] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 11:59:35 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) 11:59:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_lhecksum'}]}) 11:59:35 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x84000, 0x0) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000040)) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000140)) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0xf) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:59:35 executing program 5: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x12) 11:59:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+', 0x4ab3}, 0x28, 0x2) sendfile(r2, r3, 0x0, 0x4) 11:59:35 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x190f}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:35 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000340)='cpuset.mem_hardwall\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x12) [ 1297.371339][ T4135] EXT4-fs (sda1): Unrecognized mount option "journal_lhecksum" or missing value 11:59:35 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045003, &(0x7f00000004c0)) 11:59:35 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x101a00, 0x0) write$P9_RMKDIR(r0, &(0x7f0000000340)={0x14, 0x49, 0x1, {0x0, 0x1, 0x5}}, 0x14) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000380)=0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/wireless\x00') setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000280)=0x401, 0x4) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) dup2(r4, r4) r5 = openat$cgroup_ro(r3, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x4) 11:59:35 executing program 0: clone(0x3102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$radio(&(0x7f0000000340)='/dev/radio#\x00', 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000640)={0x3, 0xfd0, 0x8, {0x77359400}, 0x80, 0xcef}) r1 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x0, 0x105000) mq_notify(r2, &(0x7f0000000200)={0x0, 0x3f, 0x4, @tid=r1}) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f00000006c0)={0x0, @reserved}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x24) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000003c0)) ptrace$setregs(0xd, r1, 0x3, &(0x7f00000005c0)="edaa29a05b59ce7308bbbae86fe980e8a355f850b6540b325db1ce30bc198cdfeae6648c99d787a1c42e09ba2dd8b48fd482d51310340071f9a572afb60e9f7316f8fb34c028067bfa") timer_create(0x3, &(0x7f0000000140)={0x0, 0x11, 0x0, @tid=r1}, &(0x7f0000000180)=0x0) syz_open_dev$adsp(&(0x7f0000000400)='/dev/adsp#\x00', 0x1f, 0xa40c2) timer_getoverrun(r3) r4 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x40, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)='trusted.overlay.upper\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="00fb8004fb52643395c991bb9e7f46be1b56eb7e8fa375ec38e97af3566da68658ce31e5e2ad25c8066b7789e4e1b079d60ee18c7d4d7f62ff88c867b33a2ae4c8eca909d3495cd723a066e33d80ec1148066f40e0d207129d11cccee6bbba355111f7d5685751d11748ba4f712c64cd7a28a45a8a349fcce4b305b73c2b6d0565c1efb510ed69888235bbda43853d7a23601e03ec92e48a585e524abc250a3bca97d498aebe3537193c43265d1c61a36ff7a73f3d38d86c8d8e0dd1949e020c137c752d090ec4735987f6fad48f537b894498131c911c84781971bd3e2d13e509e317ef0fe34fa9abd61ab43b824946f8a1ae57818f03c7a233796b11ef693597109ddefd9420762741dac18724af39fcfb4c22f20f87b4d8d79a6e0b131f205f052032d8fa564ae1b68b05ca9706e121982ae47ac7f41a4b0400000000000000000000000095b3dd"], 0x80, 0x1) fcntl$setpipe(r4, 0x407, 0x9) ptrace$getenv(0x4201, r1, 0x6, &(0x7f0000000240)) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x9) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000580)=0x2, 0x4) r6 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x200, 0x40) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000040)=""/60) ptrace$cont(0x1f, r1, 0x0, 0x0) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') getrlimit(0xc, &(0x7f00000002c0)) sendmsg$TIPC_CMD_GET_NODES(r6, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0xc0000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r7, 0x310, 0x70bd2a, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x8015) 11:59:35 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1f00}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:35 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000280)='\xe9\xff\xff\xff\xff\xff\xff\xff', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x12) [ 1297.563557][ T4158] EXT4-fs (sda1): Unrecognized mount option "journal_lhecksum" or missing value 11:59:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400201) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4) 11:59:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_ohecksum'}]}) 11:59:35 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgry\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x20000, 0x100) ioctl$EVIOCGID(r2, 0x80084502, &(0x7f0000000440)=""/141) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x1, 0x0) ioctl$CAPI_GET_PROFILE(r3, 0xc0404309, &(0x7f00000003c0)=0xdc0b) mkdirat$cgroup(r0, &(0x7f0000000340)='syz0\x00', 0x1ff) lsetxattr$security_evm(&(0x7f0000000500)='./file0\x00', &(0x7f0000000580)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="024b5cf6ffff6601353360b00cd361e075a635ffba00c7818d"], 0x9, 0x2) r4 = openat$cgroup_ro(r0, &(0x7f0000000240)='iO.stat\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x12) 11:59:35 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40, 0x0) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f00000001c0)={0x0, 0x0, @ioapic}) clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$isdn_base(0x22, 0x3, 0x0) syncfs(r2) select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x24) r3 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) ioctl$VIDIOC_ENCODER_CMD(r3, 0xc028564d, &(0x7f0000000140)={0x0, 0x1, [0x6, 0x5, 0x3, 0x7, 0x0, 0x0, 0x8, 0x2]}) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) ptrace$cont(0x1f, r1, 0x0, 0x0) 11:59:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000380)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r3 = syz_open_dev$radio(&(0x7f0000000280)='/dev/radio#\x00', 0x0, 0x2) write$P9_RLOCK(r3, &(0x7f00000002c0)={0x8, 0x35, 0x1, 0x3}, 0x8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) ioctl$KVM_SIGNAL_MSI(r4, 0x4020aea5, &(0x7f0000000240)={0x5002, 0x5000, 0x0, 0x9, 0xffffffffffffffc1}) sendfile(r2, r4, 0x0, 0x4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000340)) 11:59:35 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x2000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1297.810763][ T4180] EXT4-fs (sda1): Unrecognized mount option "journal_ohecksum" or missing value 11:59:35 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x5, 0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000280)={0x3, 'rose0\x00', 0x1}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x9, 0xfff, 0xff, 0x19, 0x8, r0, 0xffffffffffffffff}, 0x2c) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000340)='io.max\x00', 0x2, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000)=0x800, &(0x7f0000000040)=0x4) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x12) [ 1297.915791][ T4192] EXT4-fs (sda1): Unrecognized mount option "journal_ohecksum" or missing value 11:59:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x5, 0x1) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x42080, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f00000002c0)={0x2, r2}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r5 = openat$cgroup_ro(r3, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x4) 11:59:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_phecksum'}]}) 11:59:36 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045004, &(0x7f00000004c0)) 11:59:36 executing program 5: r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/attr/current\x00', 0x2, 0x0) fcntl$getflags(r0, 0x401) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup\x00', 0x200002, 0x0) rt_sigtimedwait(&(0x7f0000000280)={0x7fffffff}, &(0x7f0000000340), &(0x7f00000002c0), 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vcs\x00', 0x94000, 0x0) tee(r1, r1, 0x7, 0xc) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f00000005c0)={'ipvs\x00'}, &(0x7f0000000600)=0x1e) r3 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$BLKRRPART(r4, 0x125f, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xa028300b}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB="2c00000041000407256f2ed66e8173746174000c00740029626465767b0000"], 0x2c}, 0x1, 0x0, 0x0, 0x20000001}, 0x1) sendfile(r3, r4, 0x0, 0x12) write$UHID_DESTROY(r4, &(0x7f0000000540), 0x4) 11:59:36 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x2d00}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:36 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) mknod(&(0x7f0000000240)='./file0\x00', 0x8, 0x101) sendfile(r1, r2, 0x0, 0x12) getpeername(r1, &(0x7f0000000440)=@xdp={0x2c, 0x0, 0x0}, &(0x7f00000004c0)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000500)={'team0\x00', r3}) sendto$unix(r2, &(0x7f0000000280)="89819190b36cc7900b62b60be8ca73f3fc5685192ea72f022d560d", 0x1b, 0xc840, &(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f00000003c0)={0x2da8, 0x1, 0x4, 0x2400004, {}, {0x5, 0x1, 0xbe, 0x9, 0x0, 0x1, "71528fe3"}, 0x7, 0x3, @fd=r2, 0x4}) 11:59:36 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x100, 0x1) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000340)={0x8, 0x7, 0x5, 0x802, 0x528, 0x7fffffff, 0x4}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$media(&(0x7f0000000280)='/dev/media#\x00', 0x40, 0x42800) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4) openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x100000020000100, 0x0) 11:59:36 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x3f00}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:38 executing program 0: clone(0xc0000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0xffffffffffffffff, 0x40000000000) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:59:38 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x20000, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000280), &(0x7f00000002c0)=0x30) r2 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r3 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x12) 11:59:38 executing program 2: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = open(&(0x7f0000000100)='./file0\x00', 0x41, 0x101) ioctl$VIDIOC_STREAMOFF(r1, 0x40045613, &(0x7f0000000140)=0x7ff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x8dvg\x14B3\xde\xfd\xf1/syz1\x00', 0x200002, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) openat$userio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/userio\x00', 0x1, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000280)='cpu.weight.nice\x00', 0x2, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4) 11:59:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_shecksum'}]}) 11:59:38 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x4000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:38 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045005, &(0x7f00000004c0)) [ 1300.823334][ T4244] EXT4-fs: 3 callbacks suppressed [ 1300.823346][ T4244] EXT4-fs (sda1): Unrecognized mount option "journal_shecksum" or missing value 11:59:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xff, 0x0) ioctl$VIDIOC_S_AUDIO(r1, 0x40345622, &(0x7f0000000280)={0x7f, "ca8fa707d65b36c311fc18922a2ea7dc6fb4995fa4c6c5e4e8e84f3faf368f70", 0x2, 0x1}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4) 11:59:38 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-control\x00', 0x200, 0x0) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000340)) r2 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r3 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x12) [ 1300.914534][ T4249] IPVS: ftp: loaded support on port[0] = 21 11:59:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_uhecksum'}]}) 11:59:38 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x4800}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:38 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cgroup.max.depth\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000280)='io.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x12) 11:59:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='memory.swap.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fd) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4) 11:59:39 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() waitid(0x2, r0, &(0x7f00000001c0), 0x20000000, &(0x7f0000000240)) r1 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x32) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x20, 0x0, 0x0, 0x3, 0xfa}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x101, 0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000180)=r1) ptrace$cont(0x1f, r1, 0x0, 0x0) r3 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) setsockopt$inet6_tcp_buf(r3, 0x6, 0x1c, &(0x7f0000000040)="cb7305b94f9df7d98ee8892c96315ecce567375c5581488de6fe9a378980e615f99bd636f433d7ac5328ffae19226aed1101957b68c05c2847d777c562d254f5333211bfd9a07568e008c38bc91b7434f2d699a0", 0x54) 11:59:39 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000240), 0x4) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x12) dup3(r1, r2, 0x80000) 11:59:39 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x4c00}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1301.199090][ T4268] EXT4-fs (sda1): Unrecognized mount option "journal_uhecksum" or missing value 11:59:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x2, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000400)={0xffffffffffffffff}, 0x0, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000480)={0x4, 0x8, 0xfa00, {r3, 0x4901}}, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4420002}, 0xc, &(0x7f0000000380)={&(0x7f00000004c0)=ANY=[@ANYBLOB="41006f9d380484b2dbcece286d351086b78d0000", @ANYRES16=r2, @ANYBLOB="00032cbd7000fcdbdf2501000000b9ffffff01410000001800170000001a04000000000000006f73653000000000"], 0x34}, 0x1, 0x0, 0x0, 0x40800}, 0x40000) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) openat$cgroup_ro(r4, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) 11:59:39 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x2042, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x32080002}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0xa8, r3, 0x0, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x401}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x80000000}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_U_THRESH={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6_vti0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @remote}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x8000}, 0x2400c000) r4 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x12) sendto$inet6(r4, &(0x7f0000000480)="0ca626ddb5075a89f64bfebee2b155caf408f94c", 0x14, 0x24004000, &(0x7f00000004c0)={0xa, 0x4e24, 0x3, @local}, 0x1c) [ 1301.313262][ T4288] EXT4-fs (sda1): Unrecognized mount option "journal_uhecksum" or missing value 11:59:39 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045006, &(0x7f00000004c0)) 11:59:39 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x80000, 0x0) ioctl$sock_ifreq(r1, 0x8932, &(0x7f0000000040)={'sit0\x00', @ifru_flags=0x9000}) 11:59:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_xhecksum'}]}) 11:59:39 executing program 5: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)=0x0) r2 = accept$inet(0xffffffffffffff9c, &(0x7f00000002c0)={0x2, 0x0, @multicast1}, &(0x7f0000000340)=0x10) r3 = syz_open_dev$dmmidi(&(0x7f0000000380)='/dev/dmmidi#\x00', 0x8, 0x200000) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/capi20\x00', 0x30040, 0x0) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f0000000400)={r3, r4, 0x4}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r7 = openat$cgroup_ro(r5, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000440)) sendfile(r6, r7, 0x0, 0x12) pipe2(&(0x7f0000000240), 0x4000) shmget$private(0x0, 0x2000, 0x1, &(0x7f0000ffe000/0x2000)=nil) 11:59:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000b40)={0x0, 0x0}, &(0x7f0000000b80)=0xc) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f0000000280)='./file0\x00', 0x4480000000000000, 0x9, &(0x7f0000000a40)=[{&(0x7f0000000540)="b22682ffcc0cfb354f4cc8d56ed765ef92bf155570217637a4c1074f1d057979283b4831bcfdc8e0fa756d7b4855a290b9bff28085d81d537ff1ad0307794cb863e12f80", 0x44, 0x10000}, {&(0x7f00000005c0)="e4fe642c14f3401b6da868a8d407e30e54d1a7906e9141558694222621d6ff198e6014fb7a996ee13d7e1a1256b1ba1c60c3d3bfad7624e1b9b93273bb8ebcae78fd90e6f472e9eea0a09ddff56a1d342292f6e111a873accb9684b42511d3487746f0eac0c317bf1e2010eb58ebf2665996ce027157a25fb475a8292203271f677bb30e4aee81afae2ae338519c62e24bcb9d9d2beb69", 0x97, 0x3}, {&(0x7f0000000680)="9ae5402492ff033c48e24da0d9fb19895af39dc8622ec54c8dd1005a0e0c0ddf5bd7674c59a845cd617a6cf1a1901e25e45f583ddc5a3967bb2dd5d9640f264e99c762069e837697e894bce4377d3f7af12d242371b926f402073c66c7338b14830c441526fae5e255958119023900936d38ec036b166f9fddd1002e41ef79ed1759a58e8b7d1608f5438f4bde61d7db859ad3ece943", 0x96, 0x3}, {&(0x7f0000000740)="eaa7a991a730fcdf1d57e2355eb2c0decb03b7bff6f4ed1f3ea666e0e952edcd096eeeeea0348e71a34fa03a1d5fd896accfe158cd7110861ba4c2868d61e6c428f9fa520caad276ff99707b742363106008d7fa7a1c3fb6878969b09c169015b837b8488d8e8c66f39b6efc7d7350aed4f5b59639832ae9c9765a65052b19943bb20bf5f56f891f1dcfe8a0a0597b2a0905042178cf4cff451df01ce706659d288dd8ef296433bf555e264fa1800d6098ef1d3d96a196fa37864f78a2d270c6759793902a3166fc", 0xc8, 0x5}, {&(0x7f0000000840)="c09951cd887a2688c74d7de5ae6291b6694f01d601449edb962a2bc50ffe4838d302f7c90b1dd21fb7c6c647c5f30c6f4553ce5324da3d64a5a835eb8731175f0fb997aab10af3e95fc14dd80044d834fc93d45c4fa4f5581a3431e6814d92ba95a11151", 0x64, 0x1}, {&(0x7f00000002c0)="91f5c0b282feb883cffae72e860b00b513a4c40b7cf91ad9b317b2cf7e922375bd51352e55d6ccefc5867277ad26aaf97357513d", 0x34, 0x1f}, {&(0x7f00000008c0)="6e779b0f1bc714f804d4e5c9fd0e7f7414aa8c8d1a83253c05ec26a5724e8b3d8b90747247551602a54d0c2c2488f3835a4a349fa0ca11ea9deec4f0ba3bf502d1eb40c863dc256b57f52f89027ebb3396fe74ce32c542ac6be0fff1872df39494c172373e085b9371ce79ada4efc67f300d1ade601b5432468774e6355a827a36d091e6f3", 0x85, 0x69e}, {&(0x7f0000000980)="71a32e5eafdc82d743ec84cdc08149fdaf1dcc9d37f3c497de939bce1bb7f61f1ae345a3", 0x24, 0x1}, {&(0x7f00000009c0)="943ba8606e8ad30fb8827cd3aa0f8f29aba2d1fd5a36e82ad5850b90e3d5940869ced318c976030d0db053d466a0c46a5a47aeaf9bea06ab1b04f50d21da83aebc", 0x41, 0xff}], 0x80080, &(0x7f0000000bc0)=ANY=[@ANYBLOB='acl,euid>', @ANYRESDEC=r1, @ANYBLOB=',euid<', @ANYRESDEC=r2, @ANYBLOB="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"]) r3 = syz_open_dev$usbmon(&(0x7f0000000e00)='/dev/usbmon#\x00', 0x200, 0x200200) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0xaef9) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000f40)='io.stapz&7\xc5g\x80\xf1Z\xd4_d\x0f\x9a\x8dA\xcf\x95\xf6\xe1\x88s\xf18E7W\x8f\'1\x04\x1e\xa8)}\xd6R\xaf\xf2\x9e\xb9\x8c\xc3^\xea\xb2\xaf\xfa\xd5\xc88\xa59w)Ww\xe4hV\x95\xdd~\xe7g`*Q\x04\x008\xc7*o\xd3(\x852\x17>\x8a\x9aO\xe3\r\x00\xfaP\xd6\xa2\xd8\x9aF~\xc2\x89\xc3 ~', 0x0, 0x0) modify_ldt$read(0x0, &(0x7f0000000440)=""/224, 0xfffffffffffffe7f) sendfile(r5, r6, 0x0, 0x4) write(r4, &(0x7f0000000e40)="64df541f6cb1428bea91e5c19987d1191076973ab9d6859a63023ac4493eb1b9ae9bba5d882e6f88bf8a295149d09453dfec139c1c4a9735bf3ad106249890fb3139457522aebf726eff644c2c6b8ef88382006cdeac6e8e92a9b20d00271bbc46f92998402bba02c276a1c7a4170da267194479e03096ff24d1c3ae9ab7deb4f653fdd83ad47b1ec11a66e2ebd4fe67ab2bac419a56fe42101336c32be8ab20ff9e9eeac537765728bd49ccf361b7f26b9a7beb56baa1235413877bd0faf8f6411cf8e5b3ec75ab4e858cf8ab86fdb9ca4405db817903ede8e652378734df", 0x1fd) 11:59:39 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x6800}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:39 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000240)=0x52) sendfile(r1, r2, 0x0, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r1, 0x50, &(0x7f0000000280)}, 0x10) 11:59:39 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x19, r0, 0x100000000, 0x100) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x80, 0x0) mknodat(r1, &(0x7f0000000040)='./file0\x00', 0x800, 0x4) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1302.054177][ T4312] EXT4-fs (sda1): Unrecognized mount option "journal_xhecksum" or missing value 11:59:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4) r4 = semget$private(0x0, 0x6, 0x10) semctl$SEM_INFO(r4, 0x0, 0x13, &(0x7f0000000340)=""/211) [ 1302.169999][ T4330] EXT4-fs (sda1): Unrecognized mount option "journal_xhecksum" or missing value 11:59:40 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x6c00}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:40 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000280)='cpuacct.usage_all\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x12) 11:59:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c\x02ecksum'}]}) [ 1302.451830][ T4347] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value [ 1302.612307][ T4350] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value 11:59:40 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045007, &(0x7f00000004c0)) 11:59:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000240)=0x1) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4) 11:59:40 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f0000000300)=0xfffffffffffffffb, 0x4) r3 = openat$cgroup_ro(r0, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x12) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000240)={'sit0\x00', 0x600}) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cachefiles\x00', 0x80002, 0x0) 11:59:40 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x38, 0x0) 11:59:40 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x7400}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c\x03ecksum'}]}) [ 1303.194981][ T4363] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value 11:59:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000440)='io.stat\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x13}}}}, &(0x7f0000000340)=0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000380)={r4, @in6={{0xa, 0x4e21, 0x3, @local, 0x5c}}, 0x7, 0x1}, 0x90) sendfile(r2, r3, 0x0, 0x4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000480)={r4, @in={{0x2, 0x4e24, @empty}}, 0x4, 0xda, 0x5, 0x7ff, 0x3}, &(0x7f0000000300)=0x98) 11:59:41 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f00000006c0)='cpuset\xe7\xf0\xe3\x93\x1fj\xe7\f.cpus\x00', 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000700)={0x80000001, 0xcb7, 0x820b, 0x9df, 0x9, 0x1f, 0x80000000, 0x5, 0x0}, &(0x7f0000000740)=0x20) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000780)={0x22, 0x0, 0xffffffff00000000, 0x7fff, r2}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000640)='/dev/snapshot\x00', 0x200, 0x0) write$capi20_data(r3, &(0x7f0000000680)={{0x10, 0x800, 0x87, 0x82, 0x9, 0x6}, 0x8, "cfc58f4c3f5038c7"}, 0x1a) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x800) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, &(0x7f0000000440)) vmsplice(r4, &(0x7f0000000400)=[{&(0x7f0000000280)="90c8d7f656f154913ebe143058f8587bcfdda45a2e4c3483f68450ce4b234b6fabbe4087400a93944b03984ded8c1df895ba724bf181f70a1b29b7d87d13bbeb9a5dad572441df2221d56ab3cafb6be95f974e579e2a4c36ed5caa211c7308e64318901db293c7074570c4d923e7b90c7237f943aecd2b15b313ede838c22144", 0x28}, {&(0x7f0000000340)="f3b96a7bb900bf085b4eedc958e845f4a2e3df067d096b535ec64ac2f76245c44de371414864ae793fadb78715", 0x2d}, {&(0x7f0000000380)="15467d6c9d9b3f49e40c9ab193df14d71a103603b271605916fb6c8bad35e4b31361adba1f5915d5b89b2042f23e7f6e7249b826e97d3b90122a93b94bbbfea668ca8589c5171009dcc1334731172223fae41b6eb3fc043aece828707675222d69198b4b133a13d730d471cf6d8875038110", 0x72}], 0x281, 0x4) socket$rxrpc(0x21, 0x2, 0x2) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x3f, 0x7fffffff}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000580)={r7, @in={{0x2, 0x4e22, @multicast1}}, 0x10001, 0xfffffffffffffffc, 0x1, 0xff}, &(0x7f00000001c0)=0x98) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10020}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r6, 0x804, 0x70bd2d, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0xb68ce5794fc09106}, 0x800) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f00000004c0)={r7, 0x3082d564}, &(0x7f0000000540)=0x8) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8000) 11:59:41 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3e) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x5, 0x80100) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@local, @in6=@local}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000040)=0xe8) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:59:41 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x7a00}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1303.353833][ T4378] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value 11:59:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000280)='c\xff\a\x00\x00tat\x00', 0x0, 0x0) tee(r3, r2, 0x8000, 0x4) sendfile(r2, r3, 0x0, 0x4) 11:59:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c\x04ecksum'}]}) [ 1303.625691][ T4399] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value 11:59:42 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045009, &(0x7f00000004c0)) 11:59:42 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000000)={0x7}, 0x8) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000180)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xe8) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(r2, &(0x7f0000002ac0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002a80)={&(0x7f0000000440)={0x263c, 0x2a, 0x8, 0x70bd2d, 0x25dfdbff, {0x17}, [@nested={0x3c, 0x3b, [@generic="6527a00f1ebbd5794c04b58b73eb12061abb6aec7b6e9e4199911de9cb4d83efde71b1eda7a5289f", @typed={0x8, 0x76, @u32=0xb1}, @typed={0x8, 0x49, @u32=0x9}]}, @typed={0x8, 0x3f, @fd=r1}, @generic="32434666ed0b3eff58332d33c8e973c06bb49979e2e3383c678051cd2ae6a4bc71bc02be3caa30d0db9acb9f42238aa83ae85c9f834aac9a4bb6cf5188dad8461598dbd4a7d77cdc986035541b8a2b92f39090234b", @nested={0x8c, 0x88, [@generic="ed0abd414cda2893a2e72b0c22dec4dca0e99919f82496674580f29f0e9212ea3cae05b4e5d456eac6fa0eec5aa5998e257c11c898bb167901f03cc29901043b44817df077c0b875d2cbbb35b74db44b5ebb975463b80eb462739077df45767a2a918bb489357d48954d9566d18c0f64c719c99b6a1b91530fa4d71033b7d09f3f012884fed3"]}, @nested={0x158, 0x3e, [@typed={0x8, 0x9, @uid=r3}, @typed={0x98, 0x3e, @binary="ac928dd2682c686e41b33b9f632ab71287e23d73de0f05eda5e797c8b3664ea46f1313252d5fc144c34a938431dbc45176d6be37fa3e592ca89577804c4209ce3f1eaa37399ac7075f755952fbff10bce6df97dd0d666ff4b6a52143f481d03ea1354b61c3ea82b42ba1242acc7beb66631b062a105c5a9e355eabcce6bf7786054e2805c14b54f2d7a808d4697f16faf4c4"}, @generic="2a74f64ab3faa0987c16091a8b1ae6340e33b281496226e7d1f3450476e312efb2c57383a180414d7bc78bc5cec11f46341afdcf243a26dfa521ec180256064b058033b21bd7d98c4ebd81557f9368357338ce9038fc4c67908c47f19a5bee73324621f4a5b4c7c0f85d323ea5b661a1f69f62d63766ffe67822fabb4c0af660fec007a878a5844562", @generic="6f83e97c5fa1bb8ecb418ffe34d42574100956f1bdccff78ecd3a705485f8538cc", @typed={0x8, 0xc, @uid=r4}]}, @nested={0x1188, 0x6, [@generic="a35054dfcca21a258681bb0e94c3f4c8496f34bd636dcc61c5eddbf91d03c63ea9319f06e404321b11f70c013bda02b29741b895e4976279f2f948eb93aa195037d3f09c94e8b64324db8e437fa8232bf84ff6871da84daba5dfc96c67c49254", @generic="4f9db7795957f86b08478ab3e66b685044c246e2968b3bb428d0e1e4861907914acc8271aa72d34cab570af239a233dfc6f00a8c314946b0aeda2003263711d61905befaab2923fd5c0e8ec404cbb51a29bbc03acdf2c9ba0e8a4f332d731caa35612645057c044257c67881e7166841c04ab0b152b392c2fd8a50f5355fceb029279e6b998442e089c9e7c3a2085116d692b473ecf8dc78260213b785ced2f38c3920be5f7a3c41045bdbb1d99e162f63e5ba4801bc4e34215c383208dc6f9c937fa73117f44a1eb6bd6f799cfd", @generic="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", @generic="73248b7fa37bbaf3d22911de241e37bb2a34910557cd45b70b5ab05a753005da06c4bd47a2f681b531b24cd2e3bacc58c3b189ad708099319a91f594021947", @typed={0x14, 0x47, @ipv6=@local}]}, @nested={0x1134, 0x73, [@typed={0x14, 0x57, @ipv6=@local}, @typed={0x8, 0x66, @ipv4=@dev={0xac, 0x14, 0x14, 0x21}}, @typed={0x4, 0x13}, @generic="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", @typed={0x8, 0x70, @u32=0x9}, @typed={0x8, 0x4d, @uid=r5}, @typed={0xc, 0x38, @u64=0x100000001}, @generic="c39d3cf8b636ca4c2f8b24308bf22bb67f46f8cdfc267588fe112bf1d22215a18edfedccfbcf0d41c6bedcc420ea165b0de4a45974807ed85667eaaf65d1930e72f0b3e11fd77e5996926c4b8e6765b2213eadfa60c0f206d28b861395f0fbdde1bdf03761ebcbb6af36a178c604b5752ae16eafdaacd2b98151b5c58c8f13a631a65ce6ecb8418e83fdf0233ad5cfb498331aa052556e029bc46b94eccbcf4b30c3aaf92cb31f87e044fb94ea6f2fecb9e38619831e9140562161a7c8a2ab84fc6ebf878d02d24137737f987599eaee199b61c3528793c43c207bd91298549f1fd7817b992c018c0093913e53eed4b8a8"]}, @generic="791e0fa94a72f32d10324430ff4e7dbf7c610f5202c44131621b4ea0fb5a0056d0ffe4b16c39a39dd29d383a67d92a8e991cb15b1111ab4be082b19e657e78704cea3c0d67250f3d05121da7e81447572b381702da3d78b8cb23f81587c62ff833b2326b4832a7930e9168743e5db638bc3b142606ee4bfe6070a161c41c40424c5d690049a5eb43e577bcc89fc0f81620d13dff706a019e9034e826a33eb426534e565e2c4e6114d3413bff9433c05fdc36b63bf2745b05917406e40ff8a1dd353129617e7b12f000c13863945a65607644c2bd37b1f714a6491c29f1769dd4865ff820f8fc65295e990423e0"]}, 0x263c}, 0x1, 0x0, 0x0, 0x11}, 0x1) r6 = socket$pptp(0x18, 0x1, 0x2) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r6, 0x4, 0x9, 0x0, 0x100000001}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:59:42 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000240)={0x540e, 0x72e7, 0x3b, 0x1f, 0x4}) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) recvfrom$inet(r2, &(0x7f0000000340)=""/204, 0xcc, 0x2000, 0x0, 0x0) socket$isdn_base(0x22, 0x3, 0x0) 11:59:42 executing program 2: socketpair$unix(0x1, 0x3ffffffe, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4) 11:59:42 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xc000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c\x05ecksum'}]}) 11:59:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/dev_mcast\x00') preadv(r3, &(0x7f00000017c0), 0x10000000000001f7, 0xb8) r4 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x800020000, 0x0) sendfile(r4, r5, 0x0, 0x1) 11:59:42 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000280)=0x3) r2 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r3 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x12) 11:59:42 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x1, 0xa000) 11:59:42 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x40012) write$FUSE_OPEN(r2, &(0x7f0000000240)={0x20, 0x0, 0x1, {0x0, 0x1}}, 0x20) 11:59:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)) openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r2, r1, 0x0, 0x4) 11:59:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c\x06ecksum'}]}) 11:59:43 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc004500a, &(0x7f00000004c0)) 11:59:43 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x40000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:43 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) sendfile(r1, r2, 0x0, 0x12) 11:59:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) socketpair(0x3, 0x5, 0x8, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000280)={0x0, 0x5, 0x0, 0x3}, &(0x7f00000002c0)=0x10) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000340)={r3, 0x1}, 0x8) r4 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x4) 11:59:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c\aecksum'}]}) 11:59:43 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1a, 0x14001) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:59:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-monitor\x00', 0x80, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r2, 0x401870cc, &(0x7f0000000380)={0x1, 0x80, 0x8, 0x100000000}) r3 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x40345410, &(0x7f0000000280)={{0xffffffffffffffff, 0x3, 0x80000000, 0x3, 0x101}}) r5 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x4) 11:59:43 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000600)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000240)='/dev/vbi#\x00', 0x2, 0x2) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000280)={0x0, 0xfffffffffffff801, 0x30, 0x5, 0x81}, &(0x7f00000002c0)=0x18) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mem_hardwall\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000400)=ANY=[@ANYRES32=r3, @ANYBLOB="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"], &(0x7f00000003c0)=0x4c) lseek(r1, 0x0, 0x5) r4 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x12) 11:59:43 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045878, &(0x7f00000004c0)) 11:59:43 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) mq_unlink(&(0x7f0000000400)='#\v$\x00\x83L\x8f\xabQhD\xae\x0e\x00\x00\x00\x00\x00\x00') r1 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x20000, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000000)=0x8001, 0x4) perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x70, 0x55, 0x1a8, 0x1, 0x200, 0x0, 0x0, 0x100, 0x3, 0xe7, 0x2, 0xfffffffffffff12a, 0x7, 0x40, 0x7, 0x100000001, 0x8, 0x1f, 0xae, 0x7fffffff, 0xeaa, 0x0, 0x7fc, 0x9a8, 0x9, 0x3, 0x0, 0xb1, 0x375, 0x0, 0x2, 0x7b7, 0xc1d8, 0x1, 0x80, 0x0, 0x80000001, 0x0, 0x6, 0x4, @perf_config_ext={0x3, 0x4}, 0x20800, 0x79c, 0x10000, 0x6, 0x400, 0x3, 0x209}, r1, 0x5, r2, 0x8) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:59:43 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) membarrier(0xfffffffffffffffe, 0x0) sendfile(r1, r2, 0x0, 0x12) 11:59:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000240)=0x4, 0x4) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f00000002c0)={0x3f, 0x5, 0x7, 0x8, 0x2}, 0x14) sendfile(r3, r4, 0x0, 0x4) 11:59:43 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x80000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c\becksum'}]}) [ 1305.877333][ T4503] EXT4-fs: 8 callbacks suppressed [ 1305.877345][ T4503] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value 11:59:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000340)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/packet\x00') connect$bt_rfcomm(r3, &(0x7f0000000080)={0x1f, {0x85, 0x7fff, 0x1b5, 0xff, 0x3dd8, 0x9}, 0x9}, 0xa) r4 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x4) 11:59:43 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/udp6\x00') ioctl$CAPI_GET_FLAGS(r1, 0x80044323, &(0x7f0000000040)) r2 = openat$cgroup_int(r0, &(0x7f0000000340)='cpuacct.usage\x00', 0x2, 0x0) r3 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x12) 11:59:43 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4200, r0, 0x400000000001009, 0x9) tkill(r0, 0x24) tkill(r0, 0x24) ptrace$cont(0x3f, r0, 0x0, 0x24) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x10080, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}]}) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000040)=0x800, 0x4) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:59:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r2, r2, 0x0, 0x7) [ 1306.013835][ T4514] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value 11:59:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c\tecksum'}]}) 11:59:44 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x100000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1306.425869][ T4530] EXT4-fs (sda1): Unrecognized mount option "journal_c ecksum" or missing value [ 1306.583676][ T4534] EXT4-fs (sda1): Unrecognized mount option "journal_c ecksum" or missing value 11:59:44 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045878, &(0x7f00000004c0)) 11:59:44 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f0000000240)=0x3ff) sendfile(r1, r2, 0x0, 0x12) 11:59:44 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vfio/vfio\x00', 0x4000, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x890b, &(0x7f0000000380)={@null=' \x00', 0xe, 'nr0\x00'}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f00000002c0)={{0x77359400}, {r1, r2+10000000}}, &(0x7f0000000340)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x4) 11:59:44 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0xffffffffffffff7a, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x14, r0, 0x0, 0x100000000000) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0xffff, 0x202) write$binfmt_elf32(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xffff, 0x1f, 0x3, 0xfff, 0x3, 0x3, 0x4, 0xb0, 0x38, 0x5, 0x0, 0xb, 0x20, 0x1, 0x3ff, 0xdb, 0x81}, [{0x0, 0x1, 0xffff, 0x0, 0x3ff, 0x6, 0x0, 0x1}], "acc387f6c4776812ae233ca1ef089d612e36aea4279a1b268922af9bb19201ba6607faacfee2d57d052e538cf2e52912c017ec482d1ac2e8c18ecbd6799003159affe9b012713e223d6e333559f91ebb36fee1d0b0d47960ed374d0efc4aa9529098993a43eef65eb7e5ba45601fdd71f379b5c6f45003503c948313e3bf8ef27afc1191be"}, 0xdd) 11:59:44 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x3ff7f8}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c\necksum'}]}) 11:59:44 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x20000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8038010}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x11c, r1, 0x310, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xf8}]}, @TIPC_NLA_NET={0x60, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x10000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xece4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x101}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xba76}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}]}, @TIPC_NLA_BEARER={0x4c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x8, @mcast2, 0x400}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffffffff}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xa1d}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x84}, 0x0) clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() select(0x2036a2ac58811063, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x24) ptrace$cont(0x18, r2, 0x0, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x200801, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r3, 0xc05c5340, &(0x7f0000000040)={0x9, 0x9, 0x8, {0x0, 0x1c9c380}, 0x0, 0x7fff}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f0000000140), 0x4) 11:59:44 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4) 11:59:44 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) alarm(0x5) sendfile(r1, r2, 0x0, 0x12) [ 1306.965010][ T4548] EXT4-fs (sda1): Unrecognized mount option "journal_c [ 1306.965010][ T4548] ecksum" or missing value 11:59:44 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x3ff800}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:44 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) 11:59:45 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000280)={0x0, 0x1}, &(0x7f00000002c0)=0x8) r3 = gettid() ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000380)=r3) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000340)=@assoc_value={r2, 0x1}, 0x8) r4 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r5 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x12) [ 1307.143929][ T4569] EXT4-fs (sda1): Unrecognized mount option "journal_c [ 1307.143929][ T4569] ecksum" or missing value 11:59:45 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0189436, &(0x7f00000004c0)) 11:59:45 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) 11:59:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c\vecksum'}]}) 11:59:45 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x20200, 0x0) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000280)={0x8, "3adfeffdcca8ee3409b46eacb79abfc627690806f44eedf1759c210770d12ffd", 0x0, 0x1}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x11) 11:59:45 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x400000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:46 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x0) clone(0x80802102001fec, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) unshare(0x400) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) pwritev(r1, &(0x7f00000014c0), 0x0, 0x0) getgroups(0x0, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000240)=0xc) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000008c0)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x4000, &(0x7f0000003c80)={@local}, &(0x7f0000000280)=0x14) openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r3 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r3, r0, 0x0, 0x12) [ 1308.141732][ T4589] EXT4-fs (sda1): Unrecognized mount option "journal_c ecksum" or missing value [ 1308.260539][ T4600] EXT4-fs (sda1): Unrecognized mount option "journal_c ecksum" or missing value 11:59:47 executing program 0: r0 = gettid() r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x4000) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0106418, &(0x7f0000000040)={0x896, 0x356, 0xfffffffffffff065, 0x3ff, 0xc, 0x6}) select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffc000/0x2000)=nil) 11:59:47 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) 11:59:47 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x12) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000240)=0xe8) getgroups(0x7, &(0x7f0000000280)=[0xee01, 0xee01, 0xee01, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) write$FUSE_ENTRY(r2, &(0x7f0000000440)={0x90, 0xfffffffffffffff5, 0x6, {0x2, 0x0, 0x38d20f2c, 0x7, 0x4, 0x3, {0x5, 0x143, 0x5, 0x0, 0x100000000, 0x9, 0x7fff, 0x5, 0x458b, 0x7fffffff, 0xdabf, r3, r4, 0xffff, 0xae}}}, 0x90) 11:59:47 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xf83f00}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c\fecksum'}]}) 11:59:47 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc020660b, &(0x7f00000004c0)) [ 1310.053427][ T4605] EXT4-fs (sda1): Unrecognized mount option "journal_c ecksum" or missing value 11:59:47 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) pipe2$9p(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) write$P9_RMKNOD(r2, &(0x7f0000000380)={0x14, 0x13, 0x1, {0xe1, 0x3, 0x4}}, 0x14) r3 = syz_open_dev$cec(&(0x7f00000003c0)='/dev/cec#\x00', 0x0, 0x2) r4 = getpid() ioctl$TIOCSPGRP(r3, 0x5410, &(0x7f0000000280)=r4) socket$bt_bnep(0x1f, 0x3, 0x4) r5 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r5, 0x5419, &(0x7f0000000480)) sendfile(r1, r5, 0x0, 0x12) ioctl$UI_SET_MSCBIT(r5, 0x40045568, 0x8) 11:59:48 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) 11:59:48 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cg2\xeaI \x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x12) 11:59:48 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x3, 0x8) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000400)=ANY=[@ANYBLOB="010000005b000000a09d4d3c84ec93c33ea3886418a435c8187dab81ce802630384f40000000000000001b02da08008848038da5e7d28bd6d921399b3d7f11d672d000d934edb858c578f29958bb50f96d319587f7b4f1cf8b31b20ac2e0ada0ef876aa2a1c28a857b04a0efda6b7de398d9717b0b886e5eb87d846fb446fcaec34da8fccf55b9839ad4f350c67e24ccaacd7db9baf5ea2e3567f22b3b509de035ce4d7c64f20f5b758aabc4a21873a7463894ab00cb4b35ff829624fea15ae4a0821e33cecbe1cecfac55a680693e4354115f4cdf6dfdd25fc80cca1e5297878c87a4a7c5a6c82fe4b5b3d21ab25a67c54b93fe33e6512134644cf554d81a39e1915466b2affd32b72c6d633de42f8d18b1e5acf494187b44157cf7102d9dcac5e2759783c08fdf0ab7c82778e445f807e0581688f9007ed4cb550a6c4e42efd08ed3b5c5206f9837822d029e8b1a1d5fc1cf05f93e219d8fcb8075bcfa4234bc878878ea5fd36c2dfd37d1"]) get_robust_list(r0, &(0x7f0000000380)=&(0x7f0000000340)={&(0x7f0000000080)={&(0x7f0000000040)}, 0x0, &(0x7f0000000180)={&(0x7f0000000140)}}, &(0x7f00000003c0)=0x18) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x1) [ 1310.180815][ T4609] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 11:59:48 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) 11:59:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c\recksum'}]}) 11:59:48 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) 11:59:48 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:48 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x107000, 0x0) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000004c0)=0x0, &(0x7f0000000500), &(0x7f0000000540)) fchown(r0, r1, r2) write$P9_RFSYNC(r0, &(0x7f00000003c0)={0x7, 0x33, 0x2}, 0x7) r3 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x2, 0x2) ioctl$PPPOEIOCSFWD(r3, 0x4008b100, &(0x7f0000000280)={0x18, 0x0, {0x1, @remote, 'bond0\x00'}}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000002c0), 0x106, 0x6}}, 0x20) sendfile(r5, r6, 0x0, 0x12) 11:59:48 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ec000000", @ANYRES16=r2, @ANYBLOB="01032cbd7000ffdbdf250c000000080004000200000024000300080008006d000000080008003f00000008000300030000000800080081000000080005000340000020000200080009000100000014000100e000000100000000000000000000000058000200080006000180000008000b00000000000800090003000000080006008000000008000400ffff000014000100000000000000000000000000000000000800060008000000080000080006000700000014000200080009000700000008000004000800000008000600360f00000000000000000000000000000094672de41e1d690790aaf939e169fb0c8567dbcf8f4d63a0bffc90285fe7438e56ec6ee00b89d3f4bf0f6db736d4000495ce8808a947b555d9f789fd1a3c13c9"], 0xec}, 0x1, 0x0, 0x0, 0x4000000}, 0x14) 11:59:48 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) 11:59:48 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x12) 11:59:48 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:59:48 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)=0xaaffffff) 11:59:48 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) 11:59:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c\x0eecksum'}]}) 11:59:48 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x2000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1311.195496][ T4667] EXT4-fs: 4 callbacks suppressed [ 1311.195507][ T4667] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value 11:59:49 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x3, 0x0) open_by_handle_at(r0, &(0x7f0000000200)={0xc, 0x32f, "7218b6f8"}, 0x202) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x12) 11:59:49 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) 11:59:49 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$void(r1, 0xc0045c79) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@mcast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000080)=0xe8) r3 = getuid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x5002, &(0x7f0000000300)={[{@metacopy_on='metacopy=on'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}], [{@fowner_gt={'fowner>', r2}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@audit='audit'}, {@obj_role={'obj_role', 0x3d, '('}}, {@fowner_gt={'fowner>', r4}}]}) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:59:49 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x3000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:49 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x21, 0x742, &(0x7f0000000380)=[0x0, 0x0], 0xce}, 0x20) sendfile(r2, r1, 0x0, 0x8) openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x111200, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x5}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r3, 0x20, 0x66, 0x8}, 0x10) 11:59:49 executing program 2: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0xc0045002, &(0x7f00000004c0)) [ 1311.384943][ T4694] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value 11:59:49 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4800) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x40, 0x81, 0x34}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000180)=r2, 0x4) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) sched_getattr(r0, &(0x7f0000000000), 0x30, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:59:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c\x0fecksum'}]}) [ 1311.589508][ T4700] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 [ 1311.663275][ T4713] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value [ 1311.763661][ T4717] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value 11:59:52 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)=0xe0ffffff) 11:59:52 executing program 2: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0xc0045002, &(0x7f00000004c0)) 11:59:52 executing program 5: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x0, 0x0) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000200)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) ioctl$CAPI_SET_FLAGS(r2, 0x80044324, &(0x7f0000000240)=0x1) ioctl$SNDRV_TIMER_IOCTL_INFO(r2, 0x80e85411, &(0x7f0000000580)=""/217) sendfile(r0, r2, 0x0, 0x12) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f0000000540)=0x1) sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000500)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40001}, 0xc, &(0x7f00000004c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="10010000", @ANYRES16=r3, @ANYBLOB="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"], 0x110}, 0x1, 0x0, 0x0, 0x40}, 0x8004) 11:59:52 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x7, 0x1000) tkill(r0, 0x810036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:59:52 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x4000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c\x10ecksum'}]}) 11:59:52 executing program 2: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0xc0045002, &(0x7f00000004c0)) [ 1314.331364][ T4729] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value 11:59:52 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = dup(r0) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000340)={0x9, 0x20, [{0x1, 0x0, 0x5}, {0x4, 0x0, 0x400}, {0xbc}, {0x1000, 0x0, 0x1}, {0xfffffffffffffff8, 0x0, 0x4}, {0x6, 0x0, 0x6}, {0x1000, 0x0, 0xfffffffffffffff9}, {0x5, 0x0, 0x3}, {0x9, 0x0, 0xcbb5}]}) r3 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x12) ioctl$sock_netrom_SIOCDELRT(r3, 0x890c, &(0x7f0000000240)={0x1, @default, @bpq0='bpq0\x00', 0x1, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8, 0x1, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @bcast, @bcast, @bcast, @bcast]}) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f00000002c0)={0x200, 0x7}) 11:59:52 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) [ 1314.402207][ T4724] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000004000000, [ 1314.439185][ T4740] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value 11:59:52 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000240)='cpuacct.usage_sys\x00', 0x0, 0x0) getsockopt$inet_dccp_int(r2, 0x21, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x4) sendfile(r1, r2, 0x0, 0x12) 11:59:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c\x11ecksum'}]}) 11:59:52 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) [ 1314.688889][ T4756] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value [ 1314.787155][ T4759] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value 11:59:55 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)=0xfdfdffff) 11:59:55 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x5000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:55 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.\bt\x84\xf5\xfd', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x12) 11:59:55 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) 11:59:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c\x12ecksum'}]}) 11:59:55 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x6, 0x101000) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x501043, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000140)={0x2, r2}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:59:55 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) 11:59:55 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) setpgid(r0, r0) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:59:55 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x8000, 0x0) sendfile(r1, r2, 0x0, 0x12) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000280)={0x87, @local, 0x4e21, 0x1, 'lc\x00', 0x10, 0x3, 0x69}, 0x2c) [ 1317.444591][ T4770] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value 11:59:55 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) [ 1317.534518][ T4764] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 11:59:55 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x100000000, 0x1ff}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={r1, 0x5}, &(0x7f0000000100)=0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000640)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xd00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM\x1d2\x1c\xee\xc1\xc8\x1a\xa8\x1e\xbaH%xb\xd2I\x8fr\xe681\'3\xb0\xf4\a\xf0vHX4\xf7\xa9\x12\'\x8dN\x02\xdb\x9d\\\x8b\xa4X\x80\x96\xdb\x9f\xf3\v\xc8\xa7_\x8f\x0e\x04\\\xb9<\x82\xd2/\xea\xb2Cu\xda|d\x19\x10z\x1c\xda\xcd\x89\xbd\xa0.\xb8\xfc8\xcb\xb4n<\xe6\xe2\xeb\xac\x17\xe4\xd1A;3\xed\xde\xba\x90^\xb1k\xd0A\xd8A\xc4q\x91p\xeb3\xa1\xabO\xcb.\b\xe1;g.T\xd3\x19\xd6O\x1eL\xb4\xf9\xd3O\x02\xa1\x90\xc4W\f\xda/[^-7bs\xe7\xe6\xf3\xcb\x14c\xee\t@[\x84}\x17\xdc1[\x10\x12\xf2\xa3\x90\x8a\xb7\xb8\x7fvDQ\xf2\x80\v$6\xf7\xea\xc1\xb1\xf5\x15fVVi\x84Bo^\xbd\xa5{k\x93N\x02b+\xcb\x86Z\x91\xf3u\x97\xb6J\xce\xf52\x18\x04\xaa\xdd\x89\x91qt\xa9c\x86\xb0\xafB\x8f\xd6\xb4\xcf\x16_\f\x85\xec\x86m\x92W\xab\x0fz\x11', 0x2, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x12) 11:59:55 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) [ 1317.603554][ T4792] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value 11:59:58 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)=0xfffffdfd) 11:59:58 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) process_vm_writev(r0, &(0x7f0000002180)=[{&(0x7f0000000000)=""/14, 0xe}, {&(0x7f0000000040)=""/40, 0x28}, {&(0x7f0000000080)=""/31, 0x1f}, {&(0x7f0000000140)=""/21, 0x15}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/4096, 0x1000}], 0x6, &(0x7f0000003840)=[{&(0x7f0000002200)=""/75, 0x4b}, {&(0x7f0000002280)=""/173, 0xad}, {&(0x7f0000002340)=""/228, 0xe4}, {&(0x7f0000002440)=""/234, 0xea}, {&(0x7f0000002540)=""/68, 0x44}, {&(0x7f00000025c0)=""/130, 0x82}, {&(0x7f0000002680)=""/4096, 0x1000}, {&(0x7f0000003680)=""/226, 0xe2}, {&(0x7f0000003780)=""/78, 0x4e}, {&(0x7f0000003800)=""/56, 0x38}], 0xa, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:59:58 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x6000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 11:59:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c\x13ecksum'}]}) 11:59:58 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) 11:59:58 executing program 5: openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x8e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1f\x00\x00\x01\x00\x00\x00\x00\x000\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x06\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x12) [ 1320.495209][ T4813] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value 11:59:58 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) 11:59:58 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) connect$netrom(r0, &(0x7f0000000280)={{0x3, @bcast, 0x3}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x12) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000240)) 11:59:58 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) r1 = open(&(0x7f0000000000)='./file0\x00', 0x80200, 0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x1c}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={r2, @in6={{0xa, 0x4e22, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x100}}}, 0x84) ptrace$cont(0x18, r0, 0x0, 0x0) r3 = geteuid() fsetxattr$security_capability(r1, &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v3={0x3000000, [{0x1, 0xfff}, {0x9, 0xd082}], r3}, 0x18, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1320.617744][ T4824] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value 11:59:58 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000380)={0x0, 0x0}) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000440)={0x6}) r3 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x5ee, 0x101000) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000280)={{0x3f, 0x7}, {0xff, 0x1}, 0x100, 0x6, 0xffffffff}) getsockopt$inet_tcp_buf(r3, 0x6, 0xe, &(0x7f0000000500)=""/75, &(0x7f0000000580)=0x4b) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000600)) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f0000000340)={0x3, 0x0, 0x10001, 0x24bb}) connect$l2tp(r3, &(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x2, 0x2, 0x3, 0x4}}, 0x26) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000480)={0x6, r4}) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000005c0)={0x10000, 0x2, 0x1, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) r5 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) memfd_create(&(0x7f00000004c0)='wlan0nodev+].\x00', 0x4) sendfile(r1, r5, 0x0, 0x12) syz_execute_func(&(0x7f0000000400)="430fda32f341adf240a5c4019d7dbc7dfeefffff40d93bc42105fb805050f821406690c4a1b95d85a81f0000c4027d5a5cd100410fb56646") 11:59:58 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) [ 1320.683329][ T4817] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 11:59:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c\x14ecksum'}]}) [ 1320.864366][ T4845] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value [ 1320.980668][ T4848] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value 12:00:01 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)=0xffffffaa) 12:00:01 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) process_vm_readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)=""/186, 0xba}, {&(0x7f0000000140)=""/217, 0xd9}, {&(0x7f0000000240)=""/93, 0x5d}], 0x3, &(0x7f0000000540)=[{&(0x7f0000000300)=""/151, 0x97}, {&(0x7f00000003c0)=""/51, 0x33}, {&(0x7f0000000400)=""/214, 0xd6}, {&(0x7f0000000500)=""/31, 0x1f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x8000, 0x0) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f00000005c0)) ptrace$cont(0x1f, r0, 0x0, 0x0) 12:00:01 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x7000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:00:01 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) 12:00:01 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = accept4$ax25(0xffffffffffffff9c, &(0x7f0000000240)={{0x3, @bcast}, [@null, @rose, @remote, @default, @default, @null, @rose]}, &(0x7f00000002c0)=0x48, 0x800) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340), 0x10) r3 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x12) 12:00:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c\x15ecksum'}]}) 12:00:01 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x97\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83Q\xf1\xda\xedV\xac&\x9c\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO\xfc\xff\xff\xff\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95\x83X\xb9\xf5J\xb0\v\x0fC\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xff\xedu\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1f\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9\xdd\x12\x86\xe4\x19\x19\xe4\xa6k\xcf,GF\tP\xe5\x14\xbc\xb4\xaa\xabu\xdc\x05\x85\x1c\xc7\xbb\xb0\xfc\x91X&=^\xea\xd9\xbc\x19\xf4\xcb\xde\xa4\xbf-S\xae~&\x9f\xfe\aI\x00\x00\x00vv\x19J=W`\xd2\x04h \xbb@\xc7\xc0\xb9\v\xbc\xffmJ|tk\xe9\r\x92\xf1\xb1I\xa5\x95\xac\xc8Y\\\xd4\xd54\xf7\xa2q\xe3:9\x82\xc9\x8eS\xa4y\xf0\x14~o\x9f\xc3o\xc1\xe7t\x00\xcc\xbc\xf2\xeeMxK\x94\x1a\x8a\xaf\xc00T.\xbcWx\xae\x96\xff\xaf t\v>ZS\xacni\xa7\xb81\x0fj\xd5\xa4\xe0\x8d\xc4\xc3r\xb5q\x8e\xfa7\x05\xb5\x05uf\x94\xf8\xeaI\x13\x8c\x80\xfeM', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000240)='io.stat\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f0000000280)={{0x32, @empty, 0x4e21, 0x3, 'dh\x00', 0x1, 0x892, 0x1d}, {@remote, 0x4e23, 0x0, 0x2, 0x0, 0x5}}, 0x44) sendfile(r1, r2, 0x0, 0x12) [ 1323.644044][ T4857] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value 12:00:01 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) 12:00:01 executing program 0: clone(0x8000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1d) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) name_to_handle_at(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x1f, 0x80000001, "4dc212b2defbc20b8791bcc92f833f0e87f8b44b9595a5"}, &(0x7f0000000240), 0x1000) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(r2, 0x5501) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) ioctl$KVM_PPC_GET_PVINFO(r2, 0x4080aea1, &(0x7f0000000140)=""/220) 12:00:01 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x9000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:00:01 executing program 5: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x3000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:00:01 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) [ 1323.794006][ T4876] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value 12:00:04 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)=0xffffffe0) 12:00:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c\x16ecksum'}]}) 12:00:04 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x8, 0x428080) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000040)=""/94) ioctl$FICLONE(r1, 0x40049409, r1) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000000) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 12:00:04 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[], 0x0) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) 12:00:04 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x10000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:00:04 executing program 5 (fault-call:1 fault-nth:0): r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) [ 1326.687294][ T4899] FAULT_INJECTION: forcing a failure. [ 1326.687294][ T4899] name failslab, interval 1, probability 0, space 0, times 0 [ 1326.707352][ T4898] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value [ 1326.741497][ T4899] CPU: 0 PID: 4899 Comm: syz-executor5 Not tainted 5.0.0-rc2-next-20190118 #15 [ 1326.750483][ T4899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1326.760542][ T4899] Call Trace: [ 1326.763850][ T4899] dump_stack+0x1db/0x2d0 [ 1326.768196][ T4899] ? dump_stack_print_info.cold+0x20/0x20 [ 1326.773922][ T4899] ? __might_fault+0x12b/0x1e0 [ 1326.778709][ T4899] should_fail.cold+0xa/0x14 [ 1326.783309][ T4899] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1326.789126][ T4899] ? ___might_sleep+0x1e7/0x310 [ 1326.793996][ T4899] ? arch_local_save_flags+0x50/0x50 [ 1326.799290][ T4899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1326.805538][ T4899] __should_failslab+0x121/0x190 [ 1326.810482][ T4899] should_failslab+0x9/0x14 [ 1326.810498][ T4899] __kmalloc+0x2dc/0x740 [ 1326.810513][ T4899] ? find_held_lock+0x35/0x120 [ 1326.810534][ T4899] ? drm_ioctl+0x4a9/0xb50 [ 1326.810555][ T4899] drm_ioctl+0x4a9/0xb50 [ 1326.832660][ T4899] ? drm_mode_getblob_ioctl+0x2c0/0x2c0 [ 1326.838219][ T4899] ? lock_downgrade+0xbe0/0xbe0 [ 1326.843083][ T4899] ? drm_version+0x3d0/0x3d0 [ 1326.847691][ T4899] ? __fget+0x49a/0x710 [ 1326.851855][ T4899] ? ksys_dup3+0x660/0x660 [ 1326.856276][ T4899] ? drm_version+0x3d0/0x3d0 [ 1326.860872][ T4899] do_vfs_ioctl+0x107b/0x17d0 [ 1326.865558][ T4899] ? wait_for_completion+0x810/0x810 [ 1326.870858][ T4899] ? ioctl_preallocate+0x2f0/0x2f0 [ 1326.875993][ T4899] ? __fget_light+0x2db/0x420 [ 1326.880678][ T4899] ? fget_raw+0x20/0x20 [ 1326.884844][ T4899] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1326.891088][ T4899] ? fput+0x128/0x1a0 [ 1326.895077][ T4899] ? do_syscall_64+0x8c/0x800 [ 1326.899762][ T4899] ? do_syscall_64+0x8c/0x800 [ 1326.904441][ T4899] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1326.909735][ T4899] ? security_file_ioctl+0x93/0xc0 [ 1326.914858][ T4899] ksys_ioctl+0xab/0xd0 [ 1326.919029][ T4899] __x64_sys_ioctl+0x73/0xb0 [ 1326.923634][ T4899] do_syscall_64+0x1a3/0x800 [ 1326.928232][ T4899] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1326.933877][ T4899] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1326.939614][ T4899] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1326.945176][ T4899] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1326.951071][ T4899] RIP: 0033:0x458099 [ 1326.954978][ T4899] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1326.974591][ T4899] RSP: 002b:00007f6d7216dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1326.983021][ T4899] RAX: ffffffffffffffda RBX: 00007f6d7216dc90 RCX: 0000000000458099 12:00:04 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[], 0x0) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) 12:00:04 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x100, 0xb0000) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000140)=""/150) select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1326.990999][ T4899] RDX: 0000000020000380 RSI: fffffffffff7ffbd RDI: 0000000000000003 [ 1326.998992][ T4899] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1327.006969][ T4899] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6d7216e6d4 [ 1327.014943][ T4899] R13: 00000000004bf2d5 R14: 00000000004d0a30 R15: 0000000000000004 12:00:04 executing program 5 (fault-call:1 fault-nth:1): r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) 12:00:05 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x190f0000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:00:05 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[], 0x0) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) [ 1327.155074][ T4920] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value [ 1327.190055][ T4927] FAULT_INJECTION: forcing a failure. [ 1327.190055][ T4927] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1327.203267][ T4927] CPU: 1 PID: 4927 Comm: syz-executor5 Not tainted 5.0.0-rc2-next-20190118 #15 [ 1327.203279][ T4927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1327.203285][ T4927] Call Trace: [ 1327.203310][ T4927] dump_stack+0x1db/0x2d0 [ 1327.203334][ T4927] ? dump_stack_print_info.cold+0x20/0x20 [ 1327.203356][ T4927] ? print_usage_bug+0xd0/0xd0 [ 1327.203384][ T4927] should_fail.cold+0xa/0x14 [ 1327.203408][ T4927] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1327.203434][ T4927] ? mark_held_locks+0x100/0x100 [ 1327.222391][ T4927] ? __lock_acquire+0x572/0x4a10 [ 1327.222412][ T4927] should_fail_alloc_page+0x50/0x60 [ 1327.222433][ T4927] __alloc_pages_nodemask+0x323/0xdc0 [ 1327.271224][ T4927] ? __might_fault+0x12b/0x1e0 [ 1327.276022][ T4927] ? __alloc_pages_slowpath+0x2c50/0x2c50 [ 1327.281749][ T4927] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1327.288043][ T4927] ? ___might_sleep+0x1e7/0x310 [ 1327.292906][ T4927] ? trace_hardirqs_off+0xb8/0x310 [ 1327.298026][ T4927] cache_grow_begin+0x9c/0x8c0 [ 1327.302791][ T4927] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1327.309042][ T4927] ? check_preemption_disabled+0x48/0x290 [ 1327.314766][ T4927] __kmalloc+0x67f/0x740 [ 1327.319007][ T4927] ? find_held_lock+0x35/0x120 [ 1327.323776][ T4927] ? drm_ioctl+0x4a9/0xb50 [ 1327.328208][ T4927] drm_ioctl+0x4a9/0xb50 [ 1327.332914][ T4927] ? drm_mode_getblob_ioctl+0x2c0/0x2c0 [ 1327.338458][ T4927] ? lock_downgrade+0xbe0/0xbe0 [ 1327.343317][ T4927] ? drm_version+0x3d0/0x3d0 [ 1327.347918][ T4927] ? __fget+0x49a/0x710 [ 1327.352089][ T4927] ? ksys_dup3+0x660/0x660 [ 1327.356514][ T4927] ? drm_version+0x3d0/0x3d0 [ 1327.361118][ T4927] do_vfs_ioctl+0x107b/0x17d0 [ 1327.365810][ T4927] ? wait_for_completion+0x810/0x810 [ 1327.371098][ T4927] ? ioctl_preallocate+0x2f0/0x2f0 [ 1327.376214][ T4927] ? __fget_light+0x2db/0x420 [ 1327.380893][ T4927] ? fget_raw+0x20/0x20 [ 1327.385057][ T4927] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1327.391302][ T4927] ? fput+0x128/0x1a0 [ 1327.395289][ T4927] ? do_syscall_64+0x8c/0x800 [ 1327.399978][ T4927] ? do_syscall_64+0x8c/0x800 [ 1327.404657][ T4927] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1327.409967][ T4927] ? security_file_ioctl+0x93/0xc0 [ 1327.415102][ T4927] ksys_ioctl+0xab/0xd0 [ 1327.419262][ T4927] __x64_sys_ioctl+0x73/0xb0 [ 1327.423852][ T4927] do_syscall_64+0x1a3/0x800 [ 1327.428443][ T4927] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1327.434079][ T4927] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1327.439797][ T4927] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1327.445352][ T4927] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1327.451243][ T4927] RIP: 0033:0x458099 [ 1327.455164][ T4927] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1327.474781][ T4927] RSP: 002b:00007f6d7216dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1327.483192][ T4927] RAX: ffffffffffffffda RBX: 00007f6d7216dc90 RCX: 0000000000458099 [ 1327.491163][ T4927] RDX: 0000000020000380 RSI: fffffffffff7ffbd RDI: 0000000000000003 [ 1327.499131][ T4927] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1327.507102][ T4927] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6d7216e6d4 [ 1327.515072][ T4927] R13: 00000000004bf2d5 R14: 00000000004d0a30 R15: 0000000000000004 12:00:05 executing program 5 (fault-call:1 fault-nth:2): r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) 12:00:07 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)=0xaaffffff00000000) 12:00:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c\x17ecksum'}]}) 12:00:07 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) 12:00:07 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1f000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:00:07 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) [ 1329.803912][ T4946] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value 12:00:07 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffff00000002, &(0x7f0000000380)) 12:00:07 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) [ 1329.884807][ T4943] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 [ 1329.963652][ T4956] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value 12:00:08 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7f, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000040)=[@window={0x3, 0x8, 0x20}], 0x1) ptrace$cont(0x1f, r0, 0x0, 0x0) 12:00:08 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) 12:00:08 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffff00005421, &(0x7f0000000380)) 12:00:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c\x18ecksum'}]}) 12:00:08 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x20000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1330.263184][ T4963] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value [ 1330.394115][ T4981] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value 12:00:10 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)=0xe0ffffff00000000) 12:00:10 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x10, r0, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) 12:00:10 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffff00005450, &(0x7f0000000380)) 12:00:10 executing program 0: clone(0x32000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x420a, r0, 0x0, 0x100000) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 12:00:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c\x19ecksum'}]}) 12:00:10 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x2d000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:00:10 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffff00005451, &(0x7f0000000380)) [ 1332.856500][ T4991] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value 12:00:10 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x10, r0, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) 12:00:10 executing program 0: r0 = accept4$x25(0xffffffffffffff9c, &(0x7f0000000000)={0x9, @remote}, &(0x7f0000000040)=0x12, 0x80000) recvmmsg(r0, &(0x7f0000001c00)=[{{&(0x7f0000000140)=@nl, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/152, 0x98}, {&(0x7f0000001280)=""/84, 0x54}], 0x3}, 0x9}, {{&(0x7f0000001300)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x80, &(0x7f0000001480)=[{&(0x7f0000001380)=""/255, 0xff}], 0x1, &(0x7f00000014c0)=""/13, 0xd}, 0x20cd}, {{&(0x7f0000001500)=@l2, 0x80, &(0x7f0000001740)=[{&(0x7f0000001580)=""/163, 0xa3}, {&(0x7f0000001640)=""/45, 0x2d}, {&(0x7f0000001680)=""/105, 0x69}, {&(0x7f0000001700)=""/24, 0x18}], 0x4}, 0x6}, {{&(0x7f0000001780)=@ipx, 0x80, &(0x7f0000001b80)=[{&(0x7f0000001800)=""/124, 0x7c}, {&(0x7f0000001880)=""/101, 0x65}, {&(0x7f0000001900)=""/170, 0xaa}, {&(0x7f00000019c0)=""/43, 0x2b}, {&(0x7f0000001a00)=""/96, 0x60}, {&(0x7f0000001a80)=""/83, 0x53}, {&(0x7f0000001b00)=""/98, 0x62}], 0x7}, 0x1104}], 0x4, 0x40000000, &(0x7f0000001d00)={0x77359400}) clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x24) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 12:00:10 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffff00005452, &(0x7f0000000380)) 12:00:10 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x10, r0, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) 12:00:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c\x1aecksum'}]}) [ 1333.187749][ T5016] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value [ 1333.294094][ T5018] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value 12:00:13 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)=0xfdfdffff00000000) 12:00:13 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x3f000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:00:13 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x14, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x200280, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000015c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001600)=0x14, 0x80800) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000001640)={@dev={0xfe, 0x80, [], 0x19}, @rand_addr="9a766706b8e076992197bdcdf3d7047b", @dev={0xfe, 0x80, [], 0x1e}, 0x1, 0xcf8, 0x3, 0x500, 0x7, 0x800080, r2}) ptrace$cont(0x1f, r0, 0x0, 0x0) 12:00:13 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) 12:00:13 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffff00005460, &(0x7f0000000380)) 12:00:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c\x1becksum'}]}) 12:00:13 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffff40049409, &(0x7f0000000380)) [ 1335.949335][ T5025] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value 12:00:13 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) 12:00:13 executing program 0: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, &(0x7f0000000140)="7f4b3b4ddac3700f3e85d4eb7dde62f88ca00a8afbefaebbdca6194a6958ff2a4b61f187ef7e62896e2bd5aef750a4dd7ba5acc12f9ce32db37efb89115e7c7ffc056caa5f84aae1196f6a7649326f1fd6f4c8c5fddcdf8040cef31d4f00e0bd1ef07e0afd8ffd77279af3173ed035144f0337426c5ea66937ec676e9c7ad2c680dd2c38c00cc86c9e5d5aec17bb9a235d59f8fadec23f5616c4110f6d07281f1ac69a3911d00470653b60629ca93c80650d3e5c3e9872c0a85723694f1e0001c9c625362545c609c156d8b49bc98c197692", &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)="f42da727c10ca17b2ffc408a8c98889978351d4155aa1e6ae9679d72a9b61a148c5be7d2") ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) socket$isdn(0x22, 0x3, 0x24) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x800000000001d, r0, 0x0, 0x0) modify_ldt$write(0x1, &(0x7f0000000240)={0x100000001, 0x100000, 0x4000, 0x8, 0x200, 0x9, 0x5, 0x71, 0x6, 0xff}, 0x10) [ 1336.015480][ T5027] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 [ 1336.075449][ T5041] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value 12:00:14 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffff4020940d, &(0x7f0000000380)) 12:00:14 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) 12:00:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c\x1cecksum'}]}) [ 1336.292698][ T5058] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value [ 1336.391895][ T5060] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value 12:00:16 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xc0045878, &(0x7f0000000380)) 12:00:16 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x40000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:00:16 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(0xffffffffffffffff, 0xc0045002, &(0x7f00000004c0)) 12:00:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c\x1decksum'}]}) 12:00:16 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) setsockopt$llc_int(r0, 0x10c, 0x7, &(0x7f0000000040)=0xf342, 0x4) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) 12:00:16 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) memfd_create(&(0x7f0000000000)='self-{-[eth0&wlan1mime_type\x00', 0x5) 12:00:16 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffffc0045878, &(0x7f0000000380)) 12:00:16 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200102, 0x0) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x3) ioctl$SIOCX25SENDCALLACCPT(r1, 0x89e9) ptrace$cont(0x1f, r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f0000000180)=""/175) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r2, 0x2}}, 0x10) [ 1339.052301][ T5070] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value 12:00:17 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffffc0189436, &(0x7f0000000380)) [ 1339.167412][ T5083] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value 12:00:17 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x42, 0x0) ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000140)=0xb554) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.origin\x00') r2 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="3251774983dd5457e7bb50869275d341538fe46eb8414e22ac0e70da0f14313017b4904a613b9bf81f9211d1a9989eed40edb10932edcab93caaacfe7a8ec3810126dda8f8dd8869861e9168500ebedea965ba46c7b84398fa6d044bef019f7f07354bebae3c22483cc42c6b587f07c957178f54fa168d204e80d47d30b57448dbe498fb20a866989d04da488e2b0c", 0x8f, 0xfffffffffffffffc) keyctl$describe(0x6, r2, &(0x7f00000002c0)=""/102, 0x66) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f00000004c0)=0x1) socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$setown(r1, 0x8, r0) ptrace$cont(0x1f, r0, 0x0, 0x0) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f0000000600)={0x2, 0x6, 0x101}) recvfrom$rose(r1, &(0x7f0000000540)=""/97, 0x61, 0x40000000, &(0x7f00000005c0)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) timer_create(0x6, &(0x7f0000000440)={0x0, 0x9, 0x1, @thr={&(0x7f0000000340)="6ab456dc2b7498dc36f4a6d1801495109e397dc5ba555e198020b3600445eb2312ed7358b2d83bb10af7530740e8207c1339e9d1541c3208a07353ebfd92384a5a5c850a78877ab3ef6f5f3af3a61821b1714fe3e5dad038d8206e362c5860edec6c0f6dd005aeeebbb1038e8b7c5d3831938f87f883f03051", &(0x7f00000003c0)="ce4c41c14107182ab3fa9a738042e27e8cd2036bc31c40803741c9befdcff68c4085bfe6223327d999d5adb88d220ce62d88abef8a14c07df5ccf21ec9a708241ded89845f767565684350ce9f1adf3a869fb9d0c3e805c431"}}, &(0x7f0000000480)=0x0) clock_gettime(0x0, &(0x7f0000000640)={0x0, 0x0}) timer_settime(r3, 0x1, &(0x7f0000000500)={{0x0, 0x1c9c380}, {r4, r5+30000000}}, 0x0) 12:00:17 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:00:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c\x1eecksum'}]}) 12:00:17 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffffc020660b, &(0x7f0000000380)) 12:00:17 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffc9, &(0x7f0000000380)) [ 1339.497033][ T5104] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value 12:00:17 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(0xffffffffffffffff, 0xc0045002, &(0x7f00000004c0)) [ 1339.649715][ T5114] EXT4-fs (sda1): Unrecognized mount option "journal_cecksum" or missing value 12:00:19 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) 12:00:19 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2261, 0x20000) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000040)=""/73) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) getresuid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)=0x0) r3 = getgid() getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001600)={{{@in=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000001700)=0xe8) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000002fc0)={{0xa, 0x4e24, 0x3e0000000000000, @mcast1, 0xfffffffffffff8e3}, {0xa, 0x4e21, 0x9, @remote, 0x2}, 0x1, [0x800, 0x5, 0x100, 0xfffffffffffffff9, 0x2, 0x9, 0x7f, 0x3]}, 0x5c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001800)={0x0, 0x0}, &(0x7f0000001840)=0xc) r7 = getgid() sendmmsg$unix(r1, &(0x7f0000002f00)=[{&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000014c0)=[{&(0x7f00000001c0)="377d6c7985cf1bb429685336d27256cc57c941d19885f1db8650a005bdbfcbb6f2ed255aef16bb1067f51baf94f4f5a39e28272dc7741b354752d3e1976d7b37a9c59dacdb283d9cfcda4e344f35ba606523d5af25e4a6ae130843bf160c1c9531200e0356843e80a84dcd0540dc637dc2639387b3baba968276ce62129d3450f75cc5562ba8e337e24eac929b5dfa7bf2e6ac11db698c1ca419ea3d1df1ec", 0x9f}, {&(0x7f0000000280)="eb0c29f2f4bf5a4f3a8167b962b1062ea56ca662609c9ab739aa951cc1f0b3a4d4fcba927794f577b14dd7dd2d2f78d7d86d3f4584a262ff6549cd12a2397dccb53dfed59bcec482817d0a49107e8dc3936f3a682d3ec96d2bc25b518cb367a01d6d85a2480a002e38d41945d61312902f45b437da120830a83c574f868fb5281e5d04a125652e714e333e081a273cfd65acd4a2052a70a2e8c2c8b5a667f2810e01fe004c3ba47e7e2c418459e7461795a35ac9e4eea08a65ca9188664df0ec1c58a0563513d16dd79001d74e23ae5bd3089eca04806326d99f08ab9f80be429bd55071b8898d0eb65421", 0xeb}, {&(0x7f0000000380)="78d1f69a03e4360644c87c353d8be80e3c6fdb7903fa333424c837d8c7a15162f6c2542f5cf8910f9f94d6da3a387c4bb7ca605e005f3bde8c73604fbf54abcda74bf1d27a372eff88457a14d94f8423daea333ac410feef517dd41971220335a5812b4f1a2ddb", 0x67}, {&(0x7f0000000400)="c9eb60e8d10f6d85211aeb3e07c4ce0e6aaa7f71bda15c56cf952702acd512619f9eab9e0b14716ecc9d1155a4d7d854e31e63d39ba7b32a500032655917945e0c1dd907400190369ef1a31ec6a1d41d692ab0419f81ca0aa897c9e84d1b7033aca0ef67239165b3901b72767e0e57f3c1383de754be1731beb5de9131bb6472729550cc8e4011d3b5c21e59da6c757ed66d93fe4f3ea8e570624a6ca7ffdb61ef4ec19c30682d157ed2c3408032e192fccc6af7ec4d32", 0xb7}, {&(0x7f00000004c0)="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", 0x1000}], 0x5, &(0x7f0000001880)=[@cred={0x20, 0x1, 0x2, r0, r2, r3}, @cred={0x20, 0x1, 0x2, r0, r4, r5}, @cred={0x20, 0x1, 0x2, r0, r6, r7}], 0x60, 0x1}, {&(0x7f0000001900)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000002b80)=[{&(0x7f0000001980)="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", 0x1000}, {&(0x7f0000002980)="b7dc517efff1c0022157f4d8eb519e8d57ff4513463ca2019978de613f4eed221d1d1abf11e7a1704e0539476a8053b74013940bc058ba2b3e68843e0cef6d94bc674bc136e83a5b27af3b805a3d6ca61a780009a954dfbae446f9ef72ba3baa0575839ecd1faf59d7fc9a3c0481db3e8a1d3caa49970ff8d91273446900a224ec09aa33af6f5b167d52aad3e6a3cecee66629c62d6d61a1db2105d3dcb0533b9e88995bf02e1bf81729", 0xaa}, {&(0x7f0000002a40)="fa2013a6a170a7ae24a4a681b4b582be6610978c9151f5adbea4877a116f0651748f3954aa948c111910862672748ea86d2f68c6030d69f5cbf93dbd232d2281f9f87da27449e18f3df4daaa2bfe48612fa4283e8670d739ad20d977e47eb487", 0x60}, {&(0x7f0000002ac0)="a979dab646bec304fcf30c6fc3e480e70652ba90d70bc51cfd572fcfcf34359e508162a6db81e633c3fdc74befdf5a800c787b871c538e51ee66e5430e8967720448a05f23ff6a60665d47", 0x4b}, {&(0x7f0000002b40)="68cda56596d44b84", 0x8}], 0x5, 0x0, 0x0, 0x4004000}, {&(0x7f0000002c00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002e80)=[{&(0x7f0000002c80)="bd537434db1528119380fc1ee34ccf51bfcf611e6eaf3de7ec14d9f322aa1e70825f7919897dd747f57d0ffaaaa7a326e4f8b176390b282196f0489f5009d9d15b610a7057cbec5efe9ed067c7b6b584b61955cf348f1d7c7e840db4c70cdf4bde63d8a4ea121a686101dafc4f53e4622c9a2f63bed51f012a26be12626fa08b3b404adc52b7aa29ddba3cf11efd7cc99bb78cadff229a63fa47422e71d6b67babdd7ac30ab44f812dada1218cb5cfadd4494f8fbb5e816d92862759bfb1b971ce00f19dfd9bd82d55015435cffae009b1221cfa33bf", 0xd6}, {&(0x7f0000002d80)="142a9605c0e15124862cc8331f4e55c7a050e3028bb75b35330f2c95c0cceb78dd10ed8516e3401e0686ec5ddc9e5724114843a9ed9c3a1e27d4c7ec1c28bc1c", 0x40}, {&(0x7f0000002dc0)="4a21b5548fcbbfcfb32b1788a922fc144e49595af0dc9ce6bfa4f5d7509fd1eeb48fee9d1557b3ed203f81abc06410f7f92805730d5fe2e6afe1e829094836df60a1c929c81f1af8f42199c7af2df469cb445e8a1ec506a672d078442f8f6e3b9e2b75ea35084b829f5d5db95c1b54d90b7a99a91a9b3b6bf0f8591bd18bdfe197a0b2314c591e9c448cb3eb58a705e6b6ece82581fd520afd5e5ee40d3fc7b1a7b327443c7cb67ef881618fd6875220967cd4e79450", 0xb6}], 0x3, &(0x7f0000002ec0)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18, 0x8010}], 0x3, 0x840) 12:00:19 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f0000000080)) 12:00:19 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x4c000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:00:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c!ecksum'}]}) 12:00:19 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(0xffffffffffffffff, 0xc0045002, &(0x7f00000004c0)) [ 1342.137324][ T5129] QAT: Invalid ioctl [ 1342.162367][ T5123] EXT4-fs (sda1): Unrecognized mount option "journal_c!ecksum" or missing value 12:00:20 executing program 5: r0 = accept4$llc(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x80000) getsockname$llc(r0, &(0x7f00000000c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/mcfilter6\x00') getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x1, 0x10}, &(0x7f0000000200)=0xc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000400)={r2, @in6={{0xa, 0x4e24, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}}, [0x3f, 0x4c4b3ed6, 0xb77c, 0x100000000, 0x5, 0x2000000000000000, 0xa00000000000, 0x4, 0x80000001, 0x1, 0xfffffffffffffff9, 0x800, 0x75, 0x3, 0xa4]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000280)={r2, 0x20, &(0x7f0000000240)=[@in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e22, @empty}]}, &(0x7f00000003c0)=0x10) r3 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r3, 0x1, &(0x7f0000000140)="5a780eb548f1e034625b16cd0ad6c1cb0a51e7b265236dd697446ae06ec42afbb1502fe181990dce54812420b3e87eb6bbc5e72fb63bfa01bb35ca06674c13eb841cd8abd3cd045b6b14721351d97cfcd9fbc5d137b5c045fb0f9eb77f0cdd8f5118009370d5ef73") getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000003c0)}, &(0x7f0000000300)=0xe) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000340)={r4, 0x8}, &(0x7f0000000380)=0x8) 12:00:20 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) fcntl$lock(r1, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x400, 0x137, r0}) ptrace$setopts(0xffffffffffffffff, r0, 0x3, 0x20) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockname(0xffffffffffffff9c, &(0x7f0000000280)=@can={0x1d, 0x0}, &(0x7f0000000300)=0x80) sendto$packet(r2, &(0x7f0000000180)="0b240c9237dd5757b9a1f3a7984d24694ba228532b61083270665ccdf39637c68859a13c1c18c7c0e5e83b17058b1553de6be0745418838cb5959ab59037081027df2d4da1c5c9eddc4cd55d468c43c196dec051e2bdd43fd0e9a9332026f8503d8170d369635fc6d6ad2eebc9b7ac530d1988d3ee9509a40da3aaa887c3f53d13028b385763dab3035235632957769c86a1083aee61c8d4b86ed0ad27e98aac21c46689468f0d3a5839af24f22c10ddd427aa7ac580508269bd89a9653d586bbc5c01ef4f0db5c79354a6469c2c341dea9b497fda249410d082bcb13be1848255b8f9f2b3bfbab2a8d89e6f606d44a5be857f9e", 0xf4, 0x20000811, &(0x7f0000000340)={0x11, 0x17, r3, 0x1, 0x6, 0x6, @broadcast}, 0x14) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x101c00, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r4, 0x54a2) 12:00:20 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000400)='/proc/capi/capi20ncci\x00', 0x4084, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000380)={0x1, 0x1, {0x3b, 0x1f, 0x1, 0xd, 0x0, 0xffff, 0x2, 0x83, 0x1}}) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f0000000040)={0x400, "e8cfc49880555024e02c60c441255caa8a8d0eeca6d86686ea98429a45dc4f36", 0x400, 0x100, 0x0, 0xa, 0x1}) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e20, 0x1, @rand_addr="8a33033fa4ce0531e18755f586b47b42"}}, 0x200, 0x3f, 0x8, 0x6, 0x8}, &(0x7f0000000300)=0x98) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000004c0)=ANY=[@ANYRES32=r2, @ANYBLOB="80000700400000040700fdff6673daeaf10753207c156faf91fafe5c51ddf706c99c9f1d871a572310636be42f70f077601206fd89ac752922175b322cb8f3404380451b2611ae75709de0863426cab861d0dc2eee313f35e5e383ce1e50b453c10e8b8fda47c4ad6043107d315651b32f24d3483d0558e2ea95ba2666872a28786d3224b8458d08bd402710baa1f2dddff1dc51566df18f6e0a553d808e11b1611715d8fafb86ed067a728cbb8fff3521157e39e3d672da517569a20100f189bbc1ab28310eeb6fcc617b6c909e277f626bb51417ad5c64d403d93de3efd781781cf8dfd7ffa00442310b9f6ab884e5e46c457e5a501935b4d7a3884b3cb02c81227608db92ad59912857cde2b59c6a159e37efa92533ad2d254c42074bb794c18de015f67801a97533be1f7702ad9d71578b08d77600000000000000"], 0x16) wait4(r0, &(0x7f0000000140), 0x2, &(0x7f0000000180)) ptrace$cont(0x1f, r0, 0x0, 0x0) 12:00:20 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000080)="56c472069117500c3be9b1c337fc08cd5e445122ff3be2225477465c3048d2f14b691334bd72c06a925f3571e2c43b91fc40f835389809c56c0313f69676c248d275e875b1f202f8969f7467548bcd351c6ec58d95857a5e4e5d8f98d91e6c788bc28d9d4811ffc31ce6439d56079d8f5c73e4cc0232816711b6718d6268d67253c5583fed6f0000") [ 1342.316833][ T5130] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 12:00:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c\"ecksum'}]}) 12:00:20 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x68000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1342.546941][ T5159] EXT4-fs (sda1): Unrecognized mount option "journal_c"ecksum" or missing value [ 1342.686782][ T5163] EXT4-fs (sda1): Unrecognized mount option "journal_c"ecksum" or missing value 12:00:23 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) 12:00:23 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x8000, 0x0) ioctl$SIOCRSGL2CALL(r1, 0x89e5, &(0x7f0000000040)=@null) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) futimesat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {0x0, 0x2710}}) ptrace$cont(0x1f, r0, 0x0, 0x0) 12:00:23 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x0, &(0x7f00000004c0)) 12:00:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c#ecksum'}]}) 12:00:23 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x6c000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1345.224937][ T5177] EXT4-fs (sda1): Unrecognized mount option "journal_c#ecksum" or missing value 12:00:23 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x4, 0x2) tgkill(r0, r0, 0x3c) r1 = perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x70, 0xe33, 0xb290, 0x0, 0x3, 0x0, 0x4, 0x34, 0x1, 0x8, 0x8000, 0x7fff, 0x8, 0xb43, 0xe64, 0x7fffffff, 0x9, 0x85c2, 0x2, 0x8, 0x8, 0x800, 0x9, 0x1, 0x5, 0xffffffff, 0x80000000, 0x1000, 0x1000, 0x7, 0x1, 0x4, 0x6b90, 0x5, 0x4, 0x6ca, 0x7, 0x0, 0x0, 0x6, @perf_config_ext={0x9, 0x7}, 0x10, 0x0, 0x4, 0x6, 0x6fd3, 0x6, 0x2}, 0xffffffffffffff9c, 0xb, 0xffffffffffffffff, 0x2) fcntl$notify(r1, 0x402, 0x2) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1345.297888][ T5172] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 [ 1345.378200][ T5189] EXT4-fs (sda1): Unrecognized mount option "journal_c#ecksum" or missing value 12:00:23 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x74000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:00:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c$ecksum'}]}) 12:00:23 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) r1 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x400, 0x0) ioctl$BLKRRPART(r2, 0x125f, 0x0) fcntl$setown(r1, 0x8, r0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1345.597643][ T5197] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 [ 1345.663850][ T5201] EXT4-fs (sda1): Unrecognized mount option "journal_c$ecksum" or missing value [ 1345.814413][ T5213] EXT4-fs (sda1): Unrecognized mount option "journal_c$ecksum" or missing value 12:00:32 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2800, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000080)={0x0, @remote, @local}, &(0x7f00000000c0)=0xc) 12:00:32 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x200000) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) connect$ax25(r0, &(0x7f00000002c0)={{0x3, @null, 0x3}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null]}, 0x48) r1 = gettid() select(0xa80c1a5676945da3, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x5, 0x8000) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000340)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000f5000000ed2a4e76051ae3a557375cdccf07919dfe0bcb2f706d42e6f8f7fb42925aa4373afbbdb925ded906b82a30e075ba7a106594b7ca34e403965b3fbe6c6e486097fbec93fba4d857574d45c3d179b07ed8c9e8d92a727071a75dc60d383cff880d80f2b6a68c288aceca6e433498efd4d1b2a2bcf0605d841273ebe7931180eb50f84725f5c03126dce9fec950fb92018e66e0232e8e414c0141919f0474330c92ff7453e100738340cf81d4c88965d66691b2b0baf7877bccccace16e17302195466e340fb6e1fe0412826eff6a701c3b06aabe5f54dd4968a93f53651785a9c4039b40146669f3dc65bc81cfbdd04b09c69553ef21b6bf201c9b4a3fc4bb8f4cc30d02a7c30eb9ede58623d65316010000800e38d5739b431fe3aa87f4fdf3b89c578c63a0a250cb3d38e110feaa31c24f2137b3c54683f90fb46dfff66469bc3e60fd97f1f3d2eeb311dfe4fc833abfda7f370242c5070945b2211b4f7b58a1f2ff5e1e9909ad80966f5b4f6396ce9a2228b7c086aec3693475db"], &(0x7f0000000080)=0x119) ptrace$setopts(0x4202, r1, 0x0, 0x8000) getpid() tkill(r1, 0x24) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 12:00:32 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x0, &(0x7f00000004c0)) 12:00:32 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x7a000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:00:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c%ecksum'}]}) 12:00:32 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000006, 0x1013, r0, 0xfffffffffffffffe) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0xffffffffffffffd7, 0x0, 0x9, 0x9}]}, 0x10) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) write$P9_RLERROR(r0, &(0x7f00000000c0)={0x2e, 0x7, 0x2, {0x25, '\',cpuset[wlan0trusted{$\x84selfem0md5sum'}}, 0x2e) 12:00:32 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) timer_create(0x3, &(0x7f0000000100)={0x0, 0x11, 0x5, @thr={&(0x7f0000000080)="467a7a7ad7510703a7c8728b468ffea5250469bb1e1e49f465c667cb7efd555811b4a3d0a3884454e584673a45117d0f2f7dba4d6022f42bf43e020ec30c0a92862fd15bdb14010113032d583bf4b626", &(0x7f0000000000)="46ba35010598f7f19648a8dc7c3ac1be9e1c2008380c6c7bc1cef5d3e1dd7dc08be66c6de0d87a91"}}, &(0x7f0000000140)=0x0) timer_getoverrun(r1) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) [ 1354.515278][ T5221] EXT4-fs (sda1): Unrecognized mount option "journal_c%ecksum" or missing value 12:00:32 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x7, 0x20000) recvfrom$rxrpc(r1, &(0x7f0000000040), 0x0, 0x10040, &(0x7f0000000080)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e24, 0xfffffffeffffffff, @dev={0xfe, 0x80, [], 0x13}, 0x40}}, 0x24) 12:00:32 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)) [ 1354.620937][ T5235] EXT4-fs (sda1): Unrecognized mount option "journal_c%ecksum" or missing value 12:00:32 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) 12:00:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c&ecksum'}]}) [ 1354.704812][ T5225] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 12:00:32 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0xfffffffffffffcf7, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x200001, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000040)={0x6, 0x45, 0x5, 0x7fff}) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 12:00:32 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200000, 0x0) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x1, 0x9, 0x80000000, 0x7, 0x9, 0x2}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000100)={r2, 0x40}, &(0x7f0000000140)=0x8) 12:00:32 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x8cffffff}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1354.884891][ T5252] EXT4-fs (sda1): Unrecognized mount option "journal_c&ecksum" or missing value [ 1355.012902][ T5262] EXT4-fs (sda1): Unrecognized mount option "journal_c&ecksum" or missing value 12:00:32 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x0, &(0x7f00000004c0)) 12:00:32 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x16, 0x4800) r1 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x24) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x10000, 0x8140) r3 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x12000) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f00000001c0)={0x5cedfae2c92aefd8, &(0x7f0000000140), 0x0, r3}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x4) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 12:00:32 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) recvfrom$rxrpc(r1, &(0x7f0000000200)=""/245, 0xf5, 0x41, &(0x7f0000000300)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e21, 0x8f, @mcast2, 0x8001}}, 0x24) r2 = gettid() r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x400000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xc, &(0x7f0000000100)='&vboxnet1$)\x00', 0x0}, 0x30) ioctl$IMGETDEVINFO(r1, 0x80044944, &(0x7f0000000340)={0x800}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r2, r3, 0x0, 0x9, &(0x7f00000000c0)='cgrouplo\x00', r4}, 0x30) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:00:33 executing program 4: add_key(&(0x7f0000000040)='id_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800c5012, &(0x7f00000004c0)) 12:00:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c\'ecksum'}]}) 12:00:33 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xc0000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:00:33 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 12:00:33 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0xcf) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000000)={@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2, 0x56}) 12:00:33 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000080)={0x9, 0x7, [{0x1, 0x0, 0x9}, {0xfffffffffffffffb, 0x0, 0xcd}, {0x7, 0x0, 0x1}, {0x8, 0x0, 0x2}, {0xfffffffffffffffe, 0x0, 0x9}, {0x1, 0x0, 0x6}, {0x10001, 0x0, 0x7}, {0x4, 0x0, 0x9}, {0x80, 0x0, 0xda}]}) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) [ 1355.606413][ T5281] EXT4-fs (sda1): Unrecognized mount option "journal_c'ecksum" or missing value 12:00:33 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045002, 0x0) 12:00:33 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 12:00:33 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x2) 12:00:33 executing program 5: syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') r0 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0x6, 0x800) read(r0, &(0x7f0000000140)=""/69, 0x45) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000940)) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x135000, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x6200, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0xae44, 0x5) ioctl$KDSKBLED(r3, 0x4b65, 0x5) ioctl(r1, 0xfffffffffff7ffbd, &(0x7f0000000380)) getpid() [ 1355.742517][ T5296] EXT4-fs (sda1): Unrecognized mount option "journal_c'ecksum" or missing value 12:00:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c(ecksum'}]}) 12:00:33 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xf5ffffff}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:00:33 executing program 0: clone(0x3102001ff7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x101000, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000340), 0x4) timer_create(0x7, &(0x7f0000000000)={0x0, 0x39, 0x2, @tid=r0}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x1, &(0x7f0000000080), 0x0) ptrace$cont(0x1c, r0, 0x800, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 12:00:33 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x200000001, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x5, 0x200, 0xffffffffffffff00}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x8004, 0xffffffff00000000, 0x67, r2}, 0x10) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) 12:00:33 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000100)="7b001c718bad0c041935499b95338f5e1c410b82cdebc5453745f1d51a172c1bd4b56ed664a828fd7abb38336fd7e12a525a") ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000000)={0x1, 0xffffffffffffff81, 0xb1, 0x2, 0x3}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000080)={0x691f, 0x0, 0x10001, 0x7}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000000c0)={0x9, r1, 0x10001, 0x2}) [ 1355.933559][ T5313] EXT4-fs (sda1): Unrecognized mount option "journal_c(ecksum" or missing value 12:00:33 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socket$pppoe(0x18, 0x1, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1356.054405][ T5327] EXT4-fs (sda1): Unrecognized mount option "journal_c(ecksum" or missing value 12:00:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c)ecksum'}]}) 12:00:34 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x2) chmod(&(0x7f0000000000)='./file0\x00', 0x100) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1356.274219][ T5339] EXT4-fs (sda1): Unrecognized mount option "journal_c)ecksum" or missing value 12:00:34 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045002, 0x0) 12:00:34 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xf6ffffff}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:00:36 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) fcntl$setsig(r0, 0xa, 0x27) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='com.apple.system.Security\x00') r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) connect$rose(r1, &(0x7f00000000c0)=@short={0xb, @dev, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @null}, 0x1c) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f00000000c0)) 12:00:36 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x40000, 0x0) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000240)={0x7, 0xfffffffffffeffff, 0x7, 0x9}, 0x10) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video36\x00', 0x2, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x4000, 0x0) sched_setscheduler(r0, 0x0, &(0x7f00000002c0)=0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x35, 0x2, 0x6, 0x3db6, 0x7}, &(0x7f0000000080)=0x14) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000300)={r3, @in={{0x2, 0x4e24, @multicast1}}}, 0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000140)={r3, 0x5}, &(0x7f0000000180)=0x8) ptrace$cont(0x1f, r0, 0x0, 0x0) 12:00:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c*ecksum'}]}) 12:00:36 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xf8f73f00}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:00:36 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045002, 0x0) 12:00:36 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x21) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) r1 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x200002000000002, 0x40007) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000040)=0x5, &(0x7f0000000080)=0x4) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1371.867416][ T5332] syz-executor5 (5332) used greatest stack depth: 16504 bytes left 12:00:49 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) memfd_create(&(0x7f0000000000)='userwlan1cpuset\x00', 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa6}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:00:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c+ecksum'}]}) 12:00:49 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xfcfdffff}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:00:49 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x40) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000140)={0x7ff, {{0xa, 0x4e22, 0x9, @mcast2}}, 0x1, 0x1, [{{0xa, 0x4e21, 0xfffffffffffffffc, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xe75}}]}, 0x110) ptrace$cont(0x1f, r0, 0x0, 0x0) 12:00:50 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x1) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) 12:00:50 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) sendmsg$alg(r1, &(0x7f00000022c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)="17a9deaec92ee4be1e3ff41fe29218253ca854c5bfeccfa2f5479e54468acbba213bdf531b3c4a9ce70595f347986ae84600", 0x32}, {&(0x7f00000000c0)="3bff1fef2e5d37ad66d41a0d25f190212ed9a06a59fe65cab9f2d44a6d5d7afd02726eae3b77bffc74e2fcead733774a444dbd5edd0db4ed45774291e2df50552f77ce31306f90d0c254cc1fb79352cbefabe9d2f809166472455a0f877bafa4d729", 0x62}, {&(0x7f0000000140)="cc19a1b04f1123410c4a7ed00095cd0cc1cfcba4d8b31911cf927c797a95ea66b9bf23f5aaf0903563062203fe5c5fb49992", 0x32}, {&(0x7f0000000180)="eea25839807c547bf9080f4dcc0db0bbc32dcc85e1efd44ca13cfd3951e9b5b6ab3ef3c4217b41ded6f63d6f5b32c88918556796e4cb8d2d51e3263486f466753e79977610777f266b9016346c6995a8ebaefdeb9a683b029931b004", 0x5c}], 0x4, &(0x7f0000000240)=[@iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @assoc={0x18, 0x117, 0x4, 0x9}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}], 0x2048, 0x40014}, 0x40d0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) 12:00:50 executing program 2: 12:00:50 executing program 2: [ 1372.407569][ T5397] EXT4-fs: 3 callbacks suppressed [ 1372.407586][ T5397] EXT4-fs (sda1): Unrecognized mount option "journal_c+ecksum" or missing value 12:00:50 executing program 0: clone(0x3102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'system.', '\x00'}, &(0x7f0000000080)='\x00', 0x1, 0x3) select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 12:00:50 executing program 2: [ 1372.525644][ T5414] EXT4-fs (sda1): Unrecognized mount option "journal_c+ecksum" or missing value 12:00:50 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff}) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000200)={'broute\x00', 0x0, 0x0, 0x0, [], 0x4, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}]}, 0xb8) clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x24) ptrace$cont(0x18, r1, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 12:00:50 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xfdfdffff}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:00:50 executing program 2: 12:00:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c,ecksum'}]}) [ 1372.833312][ T5437] EXT4-fs (sda1): Unrecognized mount option "journal_c" or missing value [ 1372.963362][ T5441] EXT4-fs (sda1): Unrecognized mount option "journal_c" or missing value 12:00:53 executing program 2: clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3a) sysfs$2(0x2, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa6}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 12:00:53 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) gettid() ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000040)={0x743, 0x204, 0x9, 0x6c, 0x0}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0x9}, &(0x7f0000000180)=0x8) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 12:00:53 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x5) 12:00:58 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x10000, 0x20000) write$P9_RWRITE(r1, &(0x7f0000000100)={0xb, 0x77, 0x1, 0x3}, 0xb) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) 12:00:58 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xfffffdfc}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:00:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c-ecksum'}]}) 12:00:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000380)=""/148, 0x3a3}], 0x1000000000000206, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) preadv(r1, &(0x7f0000000100), 0x2df, 0x80000000000) 12:00:58 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x40000, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0xffffffffffffff0c, 0x5}, &(0x7f0000000040)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={r2, 0x5}, 0x8) tkill(r0, 0x24) gettid() ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 12:00:58 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x1000002, 0x11, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) fcntl$setstatus(r0, 0x4, 0x40c00) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x3, 0xa6ba, 0xb6, 0xffffffffffffc1bb}]}) [ 1380.802530][ T5464] EXT4-fs (sda1): Unrecognized mount option "journal_c-ecksum" or missing value 12:00:58 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) ioctl(r0, 0x7fff, &(0x7f0000000080)="f27b708222c60a7145777e234ba0037b3b425e57456df9bda6b8eea167139516e36053291752e0e6455d4d47215baca0527661642f961016c6149d040eec866a4cabc152c926a5e5c57c61cb6eedc96eec9685ad521a") 12:00:58 executing program 0: clone(0x40000003, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1380.961872][ T5481] EXT4-fs (sda1): Unrecognized mount option "journal_c-ecksum" or missing value 12:00:58 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000100)={'stack ', '\x00'}, 0x7) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x100, 0x0) ioctl$SIOCRSSCAUSE(r2, 0x89e1, &(0x7f0000000080)=0xfffffffffffffffb) 12:00:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c.ecksum'}]}) [ 1381.074641][ T5488] IPVS: ftp: loaded support on port[0] = 21 12:00:59 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xfffffdfd}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:00:59 executing program 2: syz_emit_ethernet(0x300600, &(0x7f0000000000)={@local, @empty=[0x6000000088caffff], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300027, 0x33, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff83, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 12:00:59 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000000)) [ 1381.218903][ T5496] EXT4-fs (sda1): Unrecognized mount option "journal_c.ecksum" or missing value 12:00:59 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xffffffffffffffff, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) 12:00:59 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000100)={0x81, 0x4}) 12:00:59 executing program 0: clone(0x83102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x101) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ptrace$cont(0x1f, r0, 0x7fff, 0x0) tkill(r0, 0x24) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x20000, 0x0) fcntl$setown(r2, 0x8, r0) ptrace$cont(0x18, r0, 0x0, 0x0) write$UHID_CREATE(r2, &(0x7f0000000200)={0x0, 'syz1\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000040)=""/60, 0x3c, 0x30c, 0x0, 0x1, 0x3c, 0x30931a99}, 0x120) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000080)=0x7, 0x4) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1381.367777][ T5508] EXT4-fs (sda1): Unrecognized mount option "journal_c.ecksum" or missing value 12:00:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c/ecksum'}]}) [ 1381.538539][ T5524] EXT4-fs (sda1): Unrecognized mount option "journal_c/ecksum" or missing value [ 1381.644571][ T5526] EXT4-fs (sda1): Unrecognized mount option "journal_c/ecksum" or missing value 12:01:01 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x8, 0x6, 0x753, 0x7ff, 0x25c39bf9, 0x4e2, 0x5, 0x7fc000000000, 0xffff, 0x6, 0x8f73}, 0xb) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) 12:01:01 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000100)={0x81, 0x4}) 12:01:01 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffff8c}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:01:01 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x402, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000080)={0x400, 0x1f, 0x3, 'queue0\x00'}) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) 12:01:01 executing program 0: clone(0x40000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x200200, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={[], 0x9, 0x0, 0x0, 0x800, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 12:01:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c0ecksum'}]}) [ 1383.847538][ T5533] EXT4-fs (sda1): Unrecognized mount option "journal_c0ecksum" or missing value 12:01:01 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffc0, &(0x7f00000000c0)) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x8, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x8001, @rand_addr="2d77b3ed62ba5fcbcd4b0f91d13cfe23", 0x2}, 0x1c) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f0000000100)={0x7000, 0x4fff}) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="ffef"]) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000001340)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0x5) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x8200, 0x0) write$P9_RFSYNC(r8, &(0x7f00000000c0)={0x7, 0x33, 0x2}, 0x7) setresgid(0x0, r7, 0x0) setresuid(0x0, r6, 0x0) mq_open(&(0x7f0000000000)='!selinux\x05\x00l S\x8a\xd1?\xa9\x94M\xf4\xe46h}S\xc9\x7finux\x00', 0x8c2, 0x0, &(0x7f0000000040)={0x0, 0x4, 0x251d, 0x0, 0xfffffffffffffffc}) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_SET_KEEPCAPS(0x8, 0x0) 12:01:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default user:00'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 12:01:01 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2400, 0x0) ioctl$SIOCAX25GETINFOOLD(r1, 0x89e9, &(0x7f0000000280)) 12:01:01 executing program 2: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xfcfdffff}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1383.965341][ T5547] EXT4-fs (sda1): Unrecognized mount option "journal_c0ecksum" or missing value [ 1383.997181][ T5550] encrypted_key: keylen parameter is missing 12:01:01 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xfffffff5}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:01:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c1ecksum'}]}) [ 1384.261925][ T5570] EXT4-fs (sda1): Unrecognized mount option "journal_c1ecksum" or missing value [ 1384.383267][ T5574] EXT4-fs (sda1): Unrecognized mount option "journal_c1ecksum" or missing value 12:01:04 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[@ANYRES64=r0, @ANYRES16=r0, @ANYRES32=0x0], 0x4) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) 12:01:04 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x4, 0x113403) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={[], 0x49, 0x0, 0x72e, 0x6, 0x9, r0}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x5) 12:01:04 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) 12:01:04 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) recvfrom$rxrpc(r1, &(0x7f0000000200)=""/245, 0xf5, 0x41, &(0x7f0000000300)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e21, 0x8f, @mcast2, 0x8001}}, 0x24) r2 = gettid() r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x400000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xc, &(0x7f0000000100)='&vboxnet1$)\x00', 0x0}, 0x30) ioctl$IMGETDEVINFO(r1, 0x80044944, &(0x7f0000000340)={0x800}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r2, r3, 0x0, 0x9, &(0x7f00000000c0)='cgrouplo\x00', r4}, 0x30) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:01:04 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xfffffff6}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:01:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c2ecksum'}]}) 12:01:04 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0xffffffffffffffff, 0x7fc) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) [ 1386.956425][ T5583] EXT4-fs (sda1): Unrecognized mount option "journal_c2ecksum" or missing value 12:01:04 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) eventfd(0x7fb) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x301000, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @multicast2}, {0x2, 0x4e21, @loopback}, {0x2, 0x4e21, @remote}, 0x4c, 0x0, 0x0, 0x0, 0x3, &(0x7f00000000c0)='ipddp0\x00', 0x1b4, 0x0, 0xb63}) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 12:01:04 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) recvfrom$rxrpc(r1, &(0x7f0000000200)=""/245, 0xf5, 0x41, &(0x7f0000000300)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e21, 0x8f, @mcast2, 0x8001}}, 0x24) r2 = gettid() r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x400000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xc, &(0x7f0000000100)='&vboxnet1$)\x00', 0x0}, 0x30) ioctl$IMGETDEVINFO(r1, 0x80044944, &(0x7f0000000340)={0x800}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r2, r3, 0x0, 0x9, &(0x7f00000000c0)='cgrouplo\x00', r4}, 0x30) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:01:04 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0xfffffffffffffffd, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bpq0='bpq0\x00', 0x7f, 'syz0\x00', @null, 0x6, 0x6, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) fsetxattr$security_evm(r0, &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@sha1={0x1, "090f8ede756bb220168ee6b30f6fe562fbafbe05"}, 0x15, 0x2) [ 1387.113839][ T5599] EXT4-fs (sda1): Unrecognized mount option "journal_c2ecksum" or missing value 12:01:05 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:01:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c3ecksum'}]}) [ 1387.424265][ T5618] EXT4-fs (sda1): Unrecognized mount option "journal_c3ecksum" or missing value [ 1387.561469][ T5623] EXT4-fs (sda1): Unrecognized mount option "journal_c3ecksum" or missing value 12:01:07 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x200000000082, 0x0) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) ioctl$int_in(r0, 0x800c5012, &(0x7f0000000040)) 12:01:07 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) recvfrom$rxrpc(r1, &(0x7f0000000200)=""/245, 0xf5, 0x41, &(0x7f0000000300)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e21, 0x8f, @mcast2, 0x8001}}, 0x24) r2 = gettid() r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x400000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xc, &(0x7f0000000100)='&vboxnet1$)\x00', 0x0}, 0x30) ioctl$IMGETDEVINFO(r1, 0x80044944, &(0x7f0000000340)={0x800}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r2, r3, 0x0, 0x9, &(0x7f00000000c0)='cgrouplo\x00', r4}, 0x30) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:01:07 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x80, 0x2000) ioctl(r0, 0x1, &(0x7f0000000380)) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xff, 0x2000) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r1, 0x3, 0x1, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) 12:01:07 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:01:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c4ecksum'}]}) 12:01:07 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0xfffffffffffffffe) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000040)="60db9c7b0f21ed0054c147001189ecf38cb7d2b814afb394785e2c98c7993f") r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ip_tables_matches\x00') ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f00000000c0)={0x10001, 0x4}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0xbc) [ 1390.056080][ T5630] EXT4-fs (sda1): Unrecognized mount option "journal_c4ecksum" or missing value 12:01:08 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f00000005c0)={'filter\x00', 0x0, 0x3, 0x8a, [], 0x7, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000500)=""/138}, &(0x7f0000000200)=0x78) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYPTR64], 0x6) ioctl$TCXONC(r0, 0x540a, 0x4) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000040)={0x1ff, 0x401}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f00000001c0)={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, r1}, 0xc) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000000940)={'vlan0\x00', 0x9950, 0x6}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000002c0)={@host}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000300)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x42}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0xfffffffffffffec9, r2, 0x100, 0x70bd2b, 0x25dfdbfb, {}, ["", "", ""]}, 0x8264ff7b8276f9df}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) 12:01:08 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x1, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000001c0)={[], 0x3, 0xfffffffffffffffc, 0x0, 0x3, 0x408fa, r0}) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x80000000, 0x101100) ioctl$DRM_IOCTL_ADD_BUFS(r1, 0xc0206416, &(0x7f00000000c0)={0x5, 0x0, 0x100, 0x0, 0x8, 0x80000001}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) bind$x25(r2, &(0x7f0000000040)={0x9, @remote={[], 0x1}}, 0x12) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) 12:01:08 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) recvfrom$rxrpc(r1, &(0x7f0000000200)=""/245, 0xf5, 0x41, &(0x7f0000000300)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e21, 0x8f, @mcast2, 0x8001}}, 0x24) gettid() openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x400000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xc, &(0x7f0000000100)='&vboxnet1$)\x00'}, 0x30) ioctl$IMGETDEVINFO(r1, 0x80044944, &(0x7f0000000340)={0x800}) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:01:08 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x7, 0x200400) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f0000000080)={0x1, 0x0, {0x8, 0x7, 0x51, 0x81}}) tkill(r0, 0x24) ptrace$cont(0x1c, r0, 0xfffffffffffffffe, 0x7f) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ioprio_set$pid(0x1, r0, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) [ 1390.194358][ T5630] EXT4-fs (sda1): Unrecognized mount option "journal_c4ecksum" or missing value 12:01:08 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x4000000000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:01:08 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbb, &(0x7f0000000080)="4973521321f04bdd640902f5584b4e05a7cad0c8b4948ac8cd8d725e9ae888f8fd8690b7dcaec7776779fc594cc365e4454dc1340f186c68852ce09932b5239f1b96b6e481078b9a3160ba28171c11782a1a6ee35a4b8d85247c94554fd47a874cdeb9ce050c53117243bc9b87b59e6d19bbc87d04cf1025daa57e750013cb7d530787187bd629fe5b074de38e6d72bc199f91c9db4776c7b46bf9450bb18aef298ca70595beeacedc0661634c4925143bff8d1c3851000abffeda2decda8891696ae2c0dafa7efc03c465e5ae95f78c53e0f46b") r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200, 0x0) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) 12:01:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c5ecksum'}]}) 12:01:08 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) recvfrom$rxrpc(r1, &(0x7f0000000200)=""/245, 0xf5, 0x41, &(0x7f0000000300)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e21, 0x8f, @mcast2, 0x8001}}, 0x24) gettid() openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x400000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xc, &(0x7f0000000100)='&vboxnet1$)\x00'}, 0x30) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:01:08 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x10002, 0x0) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000080)={0x8, "e17a40a709b41df3a2dfac310d26c396be1fb3772383308f9b26a6d62c7e9c7b", 0x1, 0x9, 0x1b, 0xffffff, 0x4}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) ioctl$TCFLSH(r0, 0x540b, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r1, 0xfffffffffff7ffbd, &(0x7f0000000380)) 12:01:08 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x800, 0x0) accept$packet(r1, &(0x7f00000001c0), &(0x7f0000000200)=0x14) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000180)={0x3, 0x0, 0x80000000, 0x1, 0x2}, 0x14) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x18000, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x1f, &(0x7f0000000040), &(0x7f0000000080)=0x4) ptrace$cont(0x1f, r0, 0x4, 0x0) [ 1390.460117][ T5667] EXT4-fs (sda1): Unrecognized mount option "journal_c5ecksum" or missing value 12:01:08 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x8000000000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:01:08 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) recvfrom$rxrpc(r1, &(0x7f0000000200)=""/245, 0xf5, 0x41, &(0x7f0000000300)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e21, 0x8f, @mcast2, 0x8001}}, 0x24) gettid() openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") [ 1390.583269][ T5678] EXT4-fs (sda1): Unrecognized mount option "journal_c5ecksum" or missing value 12:01:11 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0xc9a7, 0x10002) 12:01:11 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x3, 0x4) readahead(r0, 0x3, 0x3) ioctl(r0, 0xfffffffffff7ffbb, &(0x7f0000000080)="0cef380792bbb760985a95778a4921532dfc0a9add3aa68d24c94807cef363106ea6c5df0abcba266a1aaed142dad30f7c09197ffcfa267a36fee8d9c0f362a3ba82338899dc000000000000000000000000000000004619645036e25a91ea97ed38569584f5ee8ab1945480310738b7d9f136e5485c902eb8d78a5416c5ce3fa99172710c0e9fe783d96e94003ffa92b267b92527ab3de2b8e7e251974354de1caa0459ef81547de15c3287ffc041afc3c736c2ed631b656fb41d3c4d6dd583a020e047c72c") r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r2, 0x24}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PPPIOCDISCONN(r1, 0x7439) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000180)=0x5) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) 12:01:11 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x8, 0x440) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000400)={0x5, "47afad8a618774711d5b2a1f56029d1450cb95ad7ef2630389a93ec25cf71529", 0x3, 0x80, 0x3, 0x0, 0x10, 0xfffffffffffffffe}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={0xffffffffffffffff}, 0x106, 0xd}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000002c0)={0x15, 0x110, 0xfa00, {r2, 0x8, 0x0, 0x0, 0x0, @in6={0xa, 0x4e20, 0xbf6d, @rand_addr="46b6575baf49eecdeb12c7cefc64178a", 0x2}, @in={0x2, 0x4e23, @empty}}}, 0x118) tkill(r0, 0x24) r3 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) fsetxattr$security_smack_transmute(r3, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x1) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ioctl$PPPIOCDISCONN(r1, 0x7439) r4 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$KVM_X86_SETUP_MCE(r4, 0x4008ae9c, &(0x7f0000000000)={0x20, 0x1, 0xcd42}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0xfffffffffffffffe, 0x0) 12:01:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c6ecksum'}]}) 12:01:11 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) recvfrom$rxrpc(r1, &(0x7f0000000200)=""/245, 0xf5, 0x41, &(0x7f0000000300)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e21, 0x8f, @mcast2, 0x8001}}, 0x24) gettid() ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:01:11 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x10000000000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:01:11 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fcntl$getown(r0, 0x9) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000400)='/proc/capi/capi20\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl(r1, 0xfffffffffff7ffbd, &(0x7f0000000380)) [ 1393.300313][ T5698] EXT4-fs (sda1): Unrecognized mount option "journal_c6ecksum" or missing value 12:01:11 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) recvfrom$rxrpc(r1, &(0x7f0000000200)=""/245, 0xf5, 0x41, &(0x7f0000000300)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e21, 0x8f, @mcast2, 0x8001}}, 0x24) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:01:11 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x521000, 0x0) select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sched_setaffinity(r0, 0x8, &(0x7f00000001c0)=0x4) tkill(r0, 0xb) getpid() ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0xfffffffffffffffb, 0x9) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x208100, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200200, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x4) 12:01:11 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x40000000000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:01:11 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:01:11 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0x1, &(0x7f0000000380)) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200102) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000240)={@initdev, @remote, 0x0}, &(0x7f0000000280)=0xc) getpeername$packet(r1, &(0x7f0000000540)={0x11, 0x0, 0x0}, &(0x7f0000000580)=0x14) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f00000005c0)={@empty, 0x0}, &(0x7f0000000600)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001140)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f0000001240)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001280)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}}}, &(0x7f0000001380)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000013c0)={'team0\x00', 0x0}) accept4$packet(r1, &(0x7f0000001400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001440)=0x14, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001480)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000001580)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000015c0)={{{@in6=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f00000016c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000001700)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000001bc0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001b80)={&(0x7f0000001740)={0x438, r2, 0x300, 0x70bd2a, 0x25dfdbff, {}, [{{0x8, 0x1, r3}, {0x4}}, {{0x8, 0x1, r4}, {0x298, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x401}}, {0x8, 0x6, r5}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x100}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r7}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x7ff, 0xc3, 0x1, 0x918f}, {0x7ff, 0x7fffffff, 0x0, 0x3}, {0x4, 0xaf02, 0x4, 0x8001}, {0x8, 0x7, 0x6, 0x1f}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x54, 0x4, [{0x80, 0x2, 0x5, 0x2}, {0x4, 0x300, 0x101, 0x5}, {0x58e, 0xe8d9, 0x8001}, {0x5, 0x4, 0x1}, {0x80000001, 0x4, 0x3b67, 0x57e626b4}, {0xffffffff80000000, 0x6, 0x49c013e4, 0x8}, {0x2, 0x6, 0x1, 0x7ff}, {0xffff, 0x1, 0x2, 0x1}, {0x0, 0x3, 0x7f, 0x5}, {0x101, 0xcee0, 0x2583, 0x1000}]}}}]}}, {{0x8, 0x1, r10}, {0xb4, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x21}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r12}, {0xb4, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x400}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x800}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r13}}}]}}]}, 0x438}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) [ 1393.540601][ T5719] EXT4-fs (sda1): Unrecognized mount option "journal_c6ecksum" or missing value 12:01:14 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)) 12:01:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c7ecksum'}]}) 12:01:14 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:01:14 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002, 0x1013, r0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0xfffffffffffffcc3, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0xffa5) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000280)=0x7f, 0x4) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000100)={0x15, 0x110, 0xfa00, {r1, 0xbc8b, 0x0, 0x0, 0x0, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e23, @multicast1}}}, 0x118) getsockopt(r0, 0xb7f, 0x3ff, &(0x7f0000000300)=""/171, &(0x7f00000003c0)=0xab) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f00000002c0)={0x0, r0}) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x444000, 0x0) 12:01:14 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xf83f0000000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:01:14 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0xfffffffffffffffd, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x400, 0x0) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000180)={0x7, 0x8000}) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x40) ioctl$TIOCEXCL(r2, 0x540c) openat$cgroup_int(r2, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f00000000c0)={0x100, 0xfffffffffffeffff, 0x1, 'queue0\x00'}) [ 1396.374690][ T5739] EXT4-fs (sda1): Unrecognized mount option "journal_c7ecksum" or missing value 12:01:14 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") [ 1396.494695][ T5751] EXT4-fs (sda1): Unrecognized mount option "journal_c7ecksum" or missing value 12:01:14 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0xfffffffffffffffc, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x30) 12:01:14 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') 12:01:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c8ecksum'}]}) 12:01:14 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x100000000000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:01:14 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x30840, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x80) 12:01:14 executing program 2: ioctl(0xffffffffffffffff, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:01:14 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = shmget$private(0x0, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000ffa000/0x3000)=nil, 0x7000) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) accept$netrom(r2, &(0x7f0000000040)={{0x3, @rose}, [@default, @remote, @bcast, @rose, @default, @bcast, @netrom]}, &(0x7f0000000140)=0x48) select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20021) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f0000000000)={0x0, 0x2000, 0xdea, 0x3, 0x15c}) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f00000001c0)={0xffff, 0x0, 0x10001, 0x3ff}) ioctl$DRM_IOCTL_SG_ALLOC(r2, 0xc0106438, &(0x7f0000000200)={0x5, r3}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1396.748762][ T5765] EXT4-fs (sda1): Unrecognized mount option "journal_c8ecksum" or missing value 12:01:14 executing program 2: ioctl(0xffffffffffffffff, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:01:17 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000006, 0x813, r0, 0x3) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x12}}}, 0x8, 0x7, 0x5, 0xffffffffffffb262, 0xce}, &(0x7f0000000180)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r1, 0x7fffffff, 0x30}, 0xc) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000040)={{0xa, 0x4e24, 0xfffffffffffffff8, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xa005}, {0xa, 0x4e22, 0x9, @rand_addr="84730f5d851d64d326f0e698ea5b7ca3", 0x3}, 0x1, [0x0, 0x1, 0x350, 0xaf, 0xddc, 0x2, 0x3, 0xcb3]}, 0x5c) 12:01:17 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) fcntl$addseals(r0, 0x409, 0x4) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000080)) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000000c0)={0x7, &(0x7f0000000080)=[{0x2, 0x5, 0xffff, 0x2}, {0x9, 0xfff, 0x1, 0x5}, {0x1, 0x7, 0x5, 0x4e}, {0xdc, 0x0, 0x5, 0xb412}, {0xb9, 0x7, 0x6}, {0x3ff, 0xffffffffffffffff, 0x2cce, 0x1}, {0x86e, 0x101, 0x400, 0x81}]}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x59f283, 0x0) 12:01:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c9ecksum'}]}) 12:01:17 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x200000000000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:01:17 executing program 2: ioctl(0xffffffffffffffff, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:01:17 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x10) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x3) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 12:01:17 executing program 2: r0 = syz_open_dev$dri(0x0, 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") [ 1399.501058][ T5795] EXT4-fs (sda1): Unrecognized mount option "journal_c9ecksum" or missing value 12:01:17 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = accept4$unix(0xffffffffffffffff, &(0x7f0000000340), &(0x7f00000003c0)=0x6e, 0x80800) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x24) sched_getscheduler(r0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x2) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000140)={0x0, 0xf9, "9ae3101e099866e4f1dd9db3261116dbded876d59efa7d4dd662e3a9f6ad384f61b9fa51ea8a9e513ef5885b1d10d640674b619b6f933c0969d40aa62405fff91591220fe9c42c457092e7b037d146bf794ad81a64542f9d2228d321150e3b9629919d89eb04d1957147d3b8d53ec2ed0eb175742a7af0defbc933d4eb329676b5e54ea2e14ec5c73e9fc800c5531b83fcb187f8afa91e9bd7bccae4128f539af2c446549cec05bf3654f2d81b65d77c850bec3675b83b15583fbf0d36d8edccd00c7bff2eedc17c95e8bb3aa8a1e2c16d1438a857108855c24b6f82108ad78d2ed61d68c1872d6cf0e135b2a2f271e61bb64f2f4688db9eb2"}, &(0x7f0000000040)=0x101) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x35f70631, &(0x7f0000000400)=""/215) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @multicast2}}}, &(0x7f0000000080)=0x84) ptrace$cont(0x1f, r0, 0x0, 0x0) perf_event_open(&(0x7f0000000540)={0x3, 0x70, 0x1, 0x9, 0x495d, 0x80000001, 0x0, 0x1, 0x8, 0x2, 0x9, 0x5, 0x2, 0x3, 0x2, 0x100000000, 0x9, 0x7ff, 0x6, 0x8, 0x4, 0x401, 0x101, 0x401, 0x7fff, 0x7, 0x800, 0x0, 0x2, 0x2, 0x4, 0x3, 0xff, 0x0, 0xfffffffeffffffff, 0x6, 0x101, 0xca7, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000500), 0x8}, 0x1000, 0x0, 0x8d8f, 0xf, 0xffffffffffffffff, 0xffffffff, 0x2}, r0, 0xffffffffffffffff, r2, 0xa) 12:01:17 executing program 2: r0 = syz_open_dev$dri(0x0, 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:01:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c:ecksum'}]}) 12:01:17 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x300000000000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:01:17 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400000, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000080)={0x18, 0xf, 0x1, {{0x80, 0x0, 0x5}, 0x3}}, 0x18) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) [ 1399.834381][ T5830] EXT4-fs (sda1): Unrecognized mount option "journal_c:ecksum" or missing value 12:01:18 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f0000000040)=""/31) 12:01:18 executing program 2: r0 = syz_open_dev$dri(0x0, 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:01:18 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x100, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f0000000080)=0x14) bind$bt_hci(r1, &(0x7f0000000140)={0x1f, r2, 0x1}, 0xc) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 12:01:18 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x8, @local, 0x6}}, 0x9, 0x58, 0xe1, 0x1ff8, 0x20}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000180)={r2, 0x10001, 0x2c}, 0x8) fcntl$dupfd(r1, 0x406, r0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) 12:01:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c;ecksum'}]}) 12:01:18 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x400000000000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:01:18 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x500000, 0x20000) [ 1400.665480][ T5847] EXT4-fs (sda1): Unrecognized mount option "journal_c;ecksum" or missing value 12:01:18 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:01:18 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4001, 0x0) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f0000000040)={0x2, 0x101, 0x8, 0x8, 0x55b, 0x6}) 12:01:18 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:01:18 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x4) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) [ 1400.831894][ T5863] EXT4-fs (sda1): Unrecognized mount option "journal_c;ecksum" or missing value 12:01:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cecksum'}]}) 12:01:21 executing program 2: syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(0xffffffffffffffff, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") [ 1404.034201][ T5925] EXT4-fs (sda1): Unrecognized mount option "journal_c>ecksum" or missing value [ 1404.167701][ T5929] EXT4-fs (sda1): Unrecognized mount option "journal_c>ecksum" or missing value 12:01:24 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) ioctl$VT_RELDISP(r0, 0x5605) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x95b, 0x30}, &(0x7f00000000c0)=0xc) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000300)={0x1, 0x1, 0x3f, 0x1ff, 0x1a, 0xbd2, 0x1, 0x5, 0x4b8caea9, 0xf2, 0x10001, 0x200}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000280)={r1, 0xe9c}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)={r1, 0xcb, "952d0946c37f6233cbbe1c19184e8b0a552efc1d2570400ee8af25146509f8385c49e68510f45e75366ad98e553bfaf16ec761c33b1b5d447c29ed31ac6e9ab00968966cc1d99d0aeafe9f171f539c9c04afbf55d00ce8b903206e67c1cdda33689323e6daa3a593cabf3621f9ce61daecdb1ad9a5ee7708bb274d6ec281035d63022e76caaaa92b2cef1db2ddd4a8f317227fcc4fc162389cdddaa0bb48e0f6c0b350dc60b98555cc31d2fd7ef01a04ea7b6f0c2586204b8e626d7058fbeb80f464592bbc59fda8a0c5ce"}, &(0x7f0000000200)=0xd3) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) 12:01:24 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x700000000000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:01:24 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f00000001c0)="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") 12:01:24 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x1, 0x4) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=0x0, &(0x7f0000000140)=0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x48, 0x4, 0x2, 0x10001, 0x0, 0x205d, 0xfffffffffffffffd, 0xfd, r1}, &(0x7f00000001c0)=0x20) r2 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000040)=0x10000) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x24) ptrace$cont(0x18, r2, 0x240, 0x8b3) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x4, 0x0, 0x3, 0xfa, r2}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 12:01:24 executing program 2: syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(0xffffffffffffffff, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:01:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cAecksum'}]}) [ 1406.822114][ T5942] EXT4-fs (sda1): Unrecognized mount option "journal_cAecksum" or missing value 12:01:24 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:01:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cBecksum'}]}) 12:01:24 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x900000000000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:01:24 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:01:25 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="5d9146e03ef9c237076054") [ 1407.220848][ T5958] EXT4-fs (sda1): Unrecognized mount option "journal_cBecksum" or missing value 12:01:25 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000000000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1407.352320][ T5967] EXT4-fs (sda1): Unrecognized mount option "journal_cBecksum" or missing value 12:01:27 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000040)) 12:01:27 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, 0x0) 12:01:39 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000080)=0x1, 0x4) fadvise64(r1, 0x0, 0x8, 0x7) 12:01:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cCecksum'}]}) 12:01:39 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$cont(0xf, r0, 0x9, 0xfae) r1 = socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000040)={r2, r3/1000+10000}, 0x10) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000140)="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") ptrace$cont(0x1f, r0, 0x0, 0x0) 12:01:39 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x190f000000000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:01:39 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, 0x0) 12:01:39 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000040)) [ 1421.932631][ T5989] EXT4-fs (sda1): Unrecognized mount option "journal_cCecksum" or missing value 12:01:39 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, 0x0) 12:01:39 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x40000, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0xf8, 0x10000) r1 = dup(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x400, 0x0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000000)) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000180)=""/108) syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x6, 0x44a082) r2 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) mq_unlink(&(0x7f00000000c0)='\x00') ioctl(r2, 0xfffffffffff7ffbd, &(0x7f0000000380)) 12:01:39 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) clock_adjtime(0x7, &(0x7f0000000140)={0x0, 0x7, 0x6, 0x80, 0x543, 0x7, 0x4, 0xffffffff, 0xa232, 0x4, 0x37, 0x7, 0x2, 0xfffffffffffffff9, 0x10000, 0x60, 0x1ff, 0x3ff, 0x4, 0x200, 0x0, 0x10001, 0x5, 0x0, 0xcace, 0x80000001}) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0x800000f, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x1f, r0, 0x0, 0x0) 12:01:39 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)) 12:01:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cDecksum'}]}) 12:01:40 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1f00000000000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:01:40 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) fchmod(r0, 0x120) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x200042, 0x0) ioctl$PPPIOCDISCONN(r1, 0x7439) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) r2 = socket(0x5, 0x0, 0x401) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x8}, 0x8) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x200000) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f0000000080)=0x8000, 0x4) [ 1422.204471][ T6017] EXT4-fs (sda1): Unrecognized mount option "journal_cDecksum" or missing value 12:01:40 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)) 12:01:40 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000001c0)={'vcan0\x00', r2}) [ 1422.330301][ T6029] EXT4-fs (sda1): Unrecognized mount option "journal_cDecksum" or missing value 12:01:40 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)) 12:01:40 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x680, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000000)={0x9}, 0x0, &(0x7f0000000080)={r2, r3+10000000}, 0x8) 12:01:42 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0x100000000, &(0x7f0000000000)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='comm\x00') getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000140)={0x0, 0x72, "0470a18653d04d9b50ba7c5e9c1c2556f79ee148b26c825ba31ce4e3d9823defa10334da3455bd098a1e587d6ba75422f8845385fd8e4a1dc048347fc73d5f3ca5196eaa67fba5312e6d1b8726fa782e9bd742d9bc0b981b3f471c5194063142f73e28eb2fd72590e9019a7596b7c5a66ac4"}, &(0x7f00000001c0)=0x7a) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000200)={r2}, &(0x7f0000000240)=0x8) write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x3ff}, 0x2) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f00000000c0)={0xf, {0xff, 0x3, 0xd85, 0x1}}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm_plock\x00', 0x80, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) 12:01:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cEecksum'}]}) 12:01:42 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9") 12:01:42 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0xc02, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x401) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r1, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r1, 0x0) ioctl$int_in(r1, 0x800c5012, &(0x7f00000004c0)) 12:01:42 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x2000000000000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:01:42 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9") [ 1425.003572][ T6060] EXT4-fs (sda1): Unrecognized mount option "journal_cEecksum" or missing value 12:01:42 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) ioctl(r0, 0x5, &(0x7f00000000c0)="9b7040ae4c552092b3a77234971bdf402b88799fd0b5e93368908620704fce53ec652ff54d4d776216acbf5e2c09e9d473a294ecd93c811ea00f78502718") pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000080)=@int=0x400, 0x4) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000000)={@loopback}, &(0x7f0000000140)=0x14) 12:01:43 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9") 12:01:43 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x9, 0x10020) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) [ 1425.167876][ T6069] EXT4-fs (sda1): Unrecognized mount option "journal_cEecksum" or missing value 12:01:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cFecksum'}]}) 12:01:43 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c23707") [ 1425.376572][ T6082] EXT4-fs (sda1): Unrecognized mount option "journal_cFecksum" or missing value 12:01:43 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x1) ptrace$cont(0x1f, r0, 0x0, 0x0) 12:01:43 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x2d00000000000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:01:43 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0xce390155e239b28b, 0x0) getsockopt$bt_hci(r1, 0x0, 0x0, &(0x7f0000000080)=""/144, &(0x7f0000000140)=0x90) ioctl(r0, 0xfffffffffff7ffc0, &(0x7f0000000380)) 12:01:43 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c23707") [ 1425.514008][ T6086] EXT4-fs (sda1): Unrecognized mount option "journal_cFecksum" or missing value 12:01:45 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[@ANYPTR64], 0x8) socket$caif_stream(0x25, 0x1, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) fcntl$setsig(r0, 0xa, 0x3f) ioctl$SIOCAX25DELFWD(r0, 0x89eb, &(0x7f0000000040)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}}) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) write$FUSE_LSEEK(r0, &(0x7f0000000180)={0xfffffffffffffe13, 0x0, 0x6, {0x1}}, 0x52) 12:01:45 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200000, 0x0) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000080)=""/190) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) 12:01:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cGecksum'}]}) 12:01:45 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c23707") 12:01:45 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x3f00000000000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:01:45 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x2, 0x80800) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000040)={{0x7, 0x401}, 0x4c}, 0x10) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$cont(0x41, r0, 0xf8, 0x4000000003080) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) sched_getaffinity(r0, 0x8, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 12:01:46 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x2, 0x8000) ioctl$VIDIOC_G_ENC_INDEX(r0, 0x8818564c, &(0x7f00000002c0)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x12}}}, 0x3f, 0x1}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000180)={r1, @in={{0x2, 0x4e21, @empty}}, [0x9, 0x8, 0x8b4, 0x2, 0x3ff, 0xd2e, 0x7, 0x10000, 0x6, 0x3, 0x48000, 0x5, 0x200, 0x5, 0x7]}, &(0x7f0000000280)=0x100) io_setup(0x80000000, &(0x7f0000001c00)=0x0) io_submit(r3, 0x1, &(0x7f0000002c80)=[&(0x7f0000002c40)={0x0, 0x0, 0x0, 0x5, 0x8, r0, &(0x7f0000001c40)="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", 0x1000, 0x2, 0x0, 0x2, r0}]) r4 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000b00)=0x7, 0x4) r5 = semget(0x0, 0x1, 0x0) semctl$IPC_INFO(r5, 0x4, 0x3, &(0x7f0000000c00)=""/4096) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000b40)={r2, @in={{0x2, 0x4e20, @loopback}}, 0x0, 0x1ff, 0x9, 0x3, 0x82}, 0x98) ioctl(r4, 0xfffffffffff7ffbd, &(0x7f0000000380)) [ 1428.108706][ T6108] EXT4-fs (sda1): Unrecognized mount option "journal_cGecksum" or missing value 12:01:46 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c2370760") [ 1428.215373][ T6122] EXT4-fs (sda1): Unrecognized mount option "journal_cGecksum" or missing value 12:01:46 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c2370760") 12:01:46 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0xaa, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x400000003, 0xfa, r0}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x8000, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x9) ioprio_set$pid(0x3, r0, 0xffffffffffffffff) 12:01:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cHecksum'}]}) 12:01:46 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) fcntl$getown(r0, 0x9) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r1, 0xfffffffffff7ffbd, &(0x7f0000000380)) [ 1428.484055][ T6142] EXT4-fs (sda1): Unrecognized mount option "journal_cHecksum" or missing value [ 1428.600085][ T6146] EXT4-fs (sda1): Unrecognized mount option "journal_cHecksum" or missing value 12:01:47 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) fcntl$setlease(r0, 0x400, 0x2) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0', [{0x20, ':)'}, {0x20, 'eth0.&(^!ppp0,-\xdf'}], 0xa, "588488c779176b83893451775099b2310d31ac39ff8957e552cafc2f69161964e946830826bcffd1762c7e55192c85aeaeca96fd18e7b4b1e0ddbc265fefc918261005537aba9793ca75527ed8"}, 0x6c) 12:01:47 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x4000000000000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:01:47 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c2370760") 12:01:47 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x3, 0x0) r1 = dup(r0) getsockopt(r1, 0x7, 0x1, &(0x7f0000000000)=""/39, &(0x7f0000000080)=0x27) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) 12:01:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cIecksum'}]}) 12:01:47 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000001440)='/dev/zero\x00', 0x40000, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000001480)={0x2, [0x80000000, 0x2]}, &(0x7f00000014c0)=0x8) 12:01:47 executing program 2: [ 1429.401509][ T6155] EXT4-fs (sda1): Unrecognized mount option "journal_cIecksum" or missing value 12:01:47 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x8001) 12:01:47 executing program 2: 12:01:49 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sched_rr_get_interval(r0, &(0x7f0000000000)) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 12:01:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cJecksum'}]}) 12:01:49 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x4800000000000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1431.560236][ T6179] EXT4-fs (sda1): Unrecognized mount option "journal_cJecksum" or missing value [ 1431.701265][ T6189] EXT4-fs (sda1): Unrecognized mount option "journal_cJecksum" or missing value 12:01:50 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x20, 0x6, [0x7fff, 0x8000000000000, 0x3, 0x2, 0x5, 0x168b]}, &(0x7f0000000080)=0x14) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0)={r1, 0x6}, &(0x7f0000000100)=0x8) 12:01:50 executing program 2: 12:01:50 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x2000, 0x0) ioctl$CAPI_INSTALLED(r1, 0x80024322) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000100)) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x80001, 0x0) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="2a00000004000000000000000000000004000000000000000300000000000000020000000000000000002a29a29af3ce885c851e703ccde4a3979f4a3edee04d89472d29f51458e4a313097bbb482911e5b6b7b896ae69764ebc88f5a57df0b9dea1b8718e8be96d624159356cb7bb9cd1da9ff1ac48a07fac6ab49946ee3aad758711d266f755334b6335"], 0x2a) 12:01:50 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x4c00000000000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:01:50 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0xffffff7a, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 12:01:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cKecksum'}]}) 12:01:50 executing program 2: 12:01:50 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x100000000004206, r0, 0x0, 0x8) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40000, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0x0}, {}]}) ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, &(0x7f0000000140)={r2, 0x12}) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) sched_rr_get_interval(r0, &(0x7f0000000180)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1432.453744][ T6198] EXT4-fs (sda1): Unrecognized mount option "journal_cKecksum" or missing value 12:01:50 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x3, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) 12:01:50 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0x2aa, 0x0) 12:01:50 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x6800000000000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1432.647047][ T6219] Unknown ioctl 1074291755 12:01:50 executing program 0: clone(0x42040000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1432.817280][ T6228] IPVS: ftp: loaded support on port[0] = 21 12:01:53 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) 12:01:53 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000080)) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080)="1b43e0d0c74f52fb79a2b3fc0b206bcfdd3b9b4bed313190baedfd9e183584982cb963e951510e251fabc78689bc0a7e481ca49d12efe7795f51d7c832b03d1f4c96915b50c62131886ebb29e4b1e6f4e4b81ec3672058353079eaa092e5a35cd8f0895d148a05e6fbefe19637364e9152a7c3f82a009143cbe40a141383e3836a1de93320b95ecaa9250d6df93e84fe7290ffd8fcd5d447f6878d5c9af9f0916cd652463ca456285efe672a721b6200c5bc289d446da0d14ef3e4407a7a862a6edf8a3a12c60922e1042575e9a9", 0xce, r0}, 0x68) 12:01:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cLecksum'}]}) 12:01:53 executing program 2: syz_read_part_table(0xe01f0300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000050000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200422020002d010000d306", 0x5c}]) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 12:01:53 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x6c00000000000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:01:53 executing program 0: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x24) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x9, 0x0, 0x0, 0x3, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x100, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000040)=0x10001, 0x4) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000080)=0xf) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000140)={0x0, 0x2, 0x9, 0x0, 0x0, [], [], [], 0x4, 0x6}) [ 1435.494103][ T6236] EXT4-fs (sda1): Unrecognized mount option "journal_cLecksum" or missing value [ 1435.553588][ T6241] loop2: [POWERTEC] p1 p2 [ 1435.558484][ T6241] loop2: p1 size 6553600 extends beyond EOD, truncated [ 1435.574778][ T6241] loop2: p2 start 82837517 is beyond EOD, truncated [ 1435.647895][ T6241] __loop_clr_fd: partition scan of loop2 failed (rc=-22) [ 1435.648437][ T6252] EXT4-fs (sda1): Unrecognized mount option "journal_cLecksum" or missing value [ 1435.676757][ T6240] cgroup: fork rejected by pids controller in /syz0 12:01:53 executing program 0: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x190f000000000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:01:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cMecksum'}]}) 12:01:53 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x7400000000000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1435.797644][ T6241] loop2: [POWERTEC] p1 p2 [ 1435.802383][ T6241] loop2: p1 size 6553600 extends beyond EOD, truncated [ 1435.827255][ T6241] loop2: p2 start 82837517 is beyond EOD, truncated 12:01:53 executing program 2: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x600000000000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1435.894859][ T6263] EXT4-fs (sda1): Unrecognized mount option "journal_cMecksum" or missing value [ 1436.007796][ T8064] __loop_clr_fd: partition scan of loop2 failed (rc=-22) 12:01:54 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x7a00000000000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1436.179773][ T6274] EXT4-fs (sda1): Unrecognized mount option "journal_cMecksum" or missing value 12:01:54 executing program 0: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x3f000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1436.509256][ T6284] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 12:01:56 executing program 2: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x600000000000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:02:09 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000040)={{0xa, 0x4e24, 0x0, @remote, 0xcebe}, {0xa, 0x4e20, 0x5fa2, @mcast2, 0x9}, 0x9ba3, [0x9, 0xb419, 0x0, 0x6, 0x80000001, 0x9, 0x100, 0x6]}, 0x5c) mlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r1 = fcntl$getown(r0, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f00000001c0)=0xe8) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000200)={0x40, 0x533, r1, 0x0, r2, 0x0, 0x81, 0xa800000000000000}) ioctl(r0, 0x6ae, &(0x7f00000000c0)) 12:02:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cNecksum'}]}) 12:02:09 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x8cffffff00000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:02:09 executing program 0 (fault-call:1 fault-nth:0): r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:02:09 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'veth1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000040)="848fd0da64dce9e378ae2dda304328de8b18167462baffc8d69a8a9f82c6767a48af53a16e714ddc1a466864b285b0ecbf6bdce9fddaca56f28593cbca7e1ad63a3c2d5fab3e34741983f68306af88ca301330588f5ae5741ec2e5cc14d24fdb9084d0f759b20fa0ff87ec314596a33c5af95926ccfd04a1fac99d645fd5c9e8f61babff86c42bd741c5ac2a0bee1736d2093e33c296e7d8bf4bb25951ca18a40189218b5751ffe22ab396b6bb96020c4cf32072db91774d5802429c3fe594a8ec15ff2d7ab87f01b9e6c3cc37a68895b64311781b89ef4fab2cb44919ca224d", 0xe0, 0x841, &(0x7f0000000280)={0x11, 0x0, r1, 0x1, 0x74, 0x6, @dev={[], 0x14}}, 0x14) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) 12:02:09 executing program 2 (fault-call:3 fault-nth:0): r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) [ 1451.461453][ T6300] FAULT_INJECTION: forcing a failure. [ 1451.461453][ T6300] name failslab, interval 1, probability 0, space 0, times 0 [ 1451.461745][ T6297] EXT4-fs (sda1): Unrecognized mount option "journal_cNecksum" or missing value [ 1451.492966][ T6300] CPU: 1 PID: 6300 Comm: syz-executor2 Not tainted 5.0.0-rc2-next-20190118 #15 [ 1451.502016][ T6300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1451.512068][ T6300] Call Trace: [ 1451.515385][ T6300] dump_stack+0x1db/0x2d0 [ 1451.519722][ T6300] ? dump_stack_print_info.cold+0x20/0x20 [ 1451.525437][ T6300] ? mark_held_locks+0x100/0x100 [ 1451.530393][ T6300] ? mark_held_locks+0x100/0x100 [ 1451.535342][ T6300] should_fail.cold+0xa/0x14 [ 1451.539950][ T6300] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1451.545772][ T6300] ? ___might_sleep+0x1e7/0x310 [ 1451.550626][ T6300] ? arch_local_save_flags+0x50/0x50 [ 1451.555927][ T6300] __should_failslab+0x121/0x190 [ 1451.556955][ T6307] FAULT_INJECTION: forcing a failure. [ 1451.556955][ T6307] name failslab, interval 1, probability 0, space 0, times 0 [ 1451.560868][ T6300] should_failslab+0x9/0x14 [ 1451.560916][ T6300] kmem_cache_alloc_trace+0x2d1/0x760 [ 1451.561047][ T6300] ? snd_pcm_oss_change_params+0xa4/0xd0 [ 1451.561075][ T6300] snd_pcm_oss_change_params_locked+0x1cc/0x3b70 [ 1451.595443][ T6300] ? find_held_lock+0x35/0x120 [ 1451.600217][ T6300] ? snd_pcm_oss_ioctl+0x11fb/0x3dc0 [ 1451.605525][ T6300] ? _snd_pcm_hw_param_set.constprop.0+0x630/0x630 [ 1451.612034][ T6300] ? __might_fault+0x12b/0x1e0 [ 1451.616816][ T6300] ? __might_fault+0x12b/0x1e0 [ 1451.621596][ T6300] ? find_held_lock+0x35/0x120 [ 1451.626363][ T6300] ? kasan_check_write+0x14/0x20 [ 1451.631298][ T6300] ? __mutex_unlock_slowpath+0x195/0x870 [ 1451.636922][ T6300] ? lock_acquire+0x1db/0x570 [ 1451.641627][ T6300] ? wait_for_completion+0x810/0x810 [ 1451.646916][ T6300] snd_pcm_oss_change_params+0x7b/0xd0 [ 1451.652374][ T6300] snd_pcm_oss_get_active_substream+0x136/0x190 [ 1451.658620][ T6300] snd_pcm_oss_ioctl+0x1244/0x3dc0 [ 1451.663753][ T6300] ? __fget+0x473/0x710 [ 1451.667913][ T6300] ? snd_pcm_oss_release+0x290/0x290 [ 1451.673192][ T6300] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1451.679436][ T6300] ? lock_downgrade+0xbe0/0xbe0 [ 1451.684283][ T6300] ? kasan_check_read+0x11/0x20 [ 1451.689136][ T6300] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1451.695140][ T6300] ? rcu_read_unlock_special+0x380/0x380 [ 1451.700783][ T6300] ? __fget+0x49a/0x710 [ 1451.704952][ T6300] ? ksys_dup3+0x660/0x660 [ 1451.709386][ T6300] ? snd_pcm_oss_release+0x290/0x290 [ 1451.714671][ T6300] do_vfs_ioctl+0x107b/0x17d0 [ 1451.719349][ T6300] ? wait_for_completion+0x810/0x810 [ 1451.724639][ T6300] ? ioctl_preallocate+0x2f0/0x2f0 [ 1451.729758][ T6300] ? __fget_light+0x2db/0x420 [ 1451.734438][ T6300] ? fget_raw+0x20/0x20 [ 1451.738615][ T6300] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1451.744881][ T6300] ? fput+0x128/0x1a0 [ 1451.748866][ T6300] ? do_syscall_64+0x8c/0x800 [ 1451.753546][ T6300] ? do_syscall_64+0x8c/0x800 [ 1451.758255][ T6300] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1451.763560][ T6300] ? security_file_ioctl+0x93/0xc0 [ 1451.768672][ T6300] ksys_ioctl+0xab/0xd0 [ 1451.772831][ T6300] __x64_sys_ioctl+0x73/0xb0 [ 1451.777423][ T6300] do_syscall_64+0x1a3/0x800 [ 1451.782029][ T6300] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1451.787665][ T6300] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1451.793395][ T6300] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1451.798949][ T6300] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1451.804847][ T6300] RIP: 0033:0x458099 [ 1451.808738][ T6300] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1451.828333][ T6300] RSP: 002b:00007f40a993fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1451.836735][ T6300] RAX: ffffffffffffffda RBX: 00007f40a993fc90 RCX: 0000000000458099 [ 1451.844715][ T6300] RDX: 00000000200004c0 RSI: 00000000c0045002 RDI: 0000000000000003 [ 1451.852685][ T6300] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1451.860652][ T6300] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f40a99406d4 [ 1451.868623][ T6300] R13: 00000000004c336a R14: 00000000004d5d58 R15: 0000000000000004 [ 1451.876620][ T6307] CPU: 0 PID: 6307 Comm: syz-executor0 Not tainted 5.0.0-rc2-next-20190118 #15 [ 1451.885561][ T6307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1451.895599][ T6307] Call Trace: [ 1451.898886][ T6307] dump_stack+0x1db/0x2d0 [ 1451.903222][ T6307] ? dump_stack_print_info.cold+0x20/0x20 [ 1451.908944][ T6307] ? __might_fault+0x12b/0x1e0 [ 1451.913715][ T6307] should_fail.cold+0xa/0x14 [ 1451.918312][ T6307] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1451.924147][ T6307] ? ___might_sleep+0x1e7/0x310 [ 1451.929007][ T6307] ? arch_local_save_flags+0x50/0x50 [ 1451.934320][ T6307] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1451.940565][ T6307] __should_failslab+0x121/0x190 [ 1451.945510][ T6307] should_failslab+0x9/0x14 [ 1451.950023][ T6307] __kmalloc+0x2dc/0x740 [ 1451.954278][ T6307] ? find_held_lock+0x35/0x120 [ 1451.959062][ T6307] ? drm_ioctl+0x4a9/0xb50 [ 1451.963480][ T6307] drm_ioctl+0x4a9/0xb50 [ 1451.967720][ T6307] ? drm_mode_getblob_ioctl+0x2c0/0x2c0 [ 1451.973265][ T6307] ? lock_downgrade+0xbe0/0xbe0 [ 1451.978123][ T6307] ? drm_version+0x3d0/0x3d0 [ 1451.982719][ T6307] ? __fget+0x49a/0x710 [ 1451.986879][ T6307] ? ksys_dup3+0x660/0x660 [ 1451.991297][ T6307] ? drm_version+0x3d0/0x3d0 [ 1451.995881][ T6307] do_vfs_ioctl+0x107b/0x17d0 [ 1452.000555][ T6307] ? wait_for_completion+0x810/0x810 [ 1452.005841][ T6307] ? ioctl_preallocate+0x2f0/0x2f0 [ 1452.010943][ T6307] ? __fget_light+0x2db/0x420 [ 1452.015610][ T6307] ? fget_raw+0x20/0x20 [ 1452.019762][ T6307] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1452.026043][ T6307] ? fput+0x128/0x1a0 [ 1452.030045][ T6307] ? do_syscall_64+0x8c/0x800 [ 1452.034718][ T6307] ? do_syscall_64+0x8c/0x800 [ 1452.039437][ T6307] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1452.044766][ T6307] ? security_file_ioctl+0x93/0xc0 [ 1452.049873][ T6307] ksys_ioctl+0xab/0xd0 [ 1452.054032][ T6307] __x64_sys_ioctl+0x73/0xb0 [ 1452.058619][ T6307] do_syscall_64+0x1a3/0x800 [ 1452.063209][ T6307] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1452.068846][ T6307] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1452.074576][ T6307] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1452.080145][ T6307] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1452.086067][ T6307] RIP: 0033:0x458099 [ 1452.089975][ T6307] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:02:10 executing program 5: r0 = socket(0x0, 0x7, 0x5) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000080), &(0x7f0000000140)=0x4) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) io_setup(0x1f, &(0x7f0000000000)=0x0) io_cancel(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x3f, r1, &(0x7f0000000080), 0x0, 0x80000001, 0x0, 0x1, r1}, &(0x7f0000000100)) socket$rds(0x15, 0x5, 0x0) ioctl(r1, 0xfffffffffff7ffbd, &(0x7f0000000380)) syz_init_net_socket$bt_l2cap(0x1f, 0x8, 0x0) [ 1452.109630][ T6307] RSP: 002b:00007f12a6926c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1452.118041][ T6307] RAX: ffffffffffffffda RBX: 00007f12a6926c90 RCX: 0000000000458099 [ 1452.126016][ T6307] RDX: 0000000020000000 RSI: fffffffffff7ffbd RDI: 0000000000000003 [ 1452.134006][ T6307] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1452.141975][ T6307] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12a69276d4 [ 1452.149959][ T6307] R13: 00000000004bf2d5 R14: 00000000004d0a30 R15: 0000000000000004 [ 1452.238425][ T6316] EXT4-fs (sda1): Unrecognized mount option "journal_cNecksum" or missing value 12:02:10 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xc000000000000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:02:10 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045002, &(0x7f00000004c0)) 12:02:10 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x8, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) 12:02:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cOecksum'}]}) 12:02:10 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:02:10 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x2, &(0x7f00000004c0)) 12:02:10 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) fcntl$addseals(r0, 0x409, 0x6) [ 1452.525233][ T6329] EXT4-fs (sda1): Unrecognized mount option "journal_cOecksum" or missing value 12:02:10 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3}) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f0000000000)={&(0x7f0000ffb000/0x2000)=nil, 0x2, 0x4, 0xa, &(0x7f0000ffa000/0x2000)=nil, 0x4}) 12:02:10 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xf5ffffff00000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1452.702082][ T6329] EXT4-fs (sda1): Unrecognized mount option "journal_cOecksum" or missing value 12:02:12 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x70}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x6, 0x206, 0x7, 0x6, 0x5, 0x9, 0x40a, r1}, 0x20) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0xfffffffffffffffa) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) 12:02:12 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0x100000000, &(0x7f0000000080)="4cdfb729c6a78cb725be6e65ff1598961c1ff9ab38659250c93b1e4d19408c0de9c50ce7f70fe43ff11c8acc7db6e086da499192b8223a94e1bcbb386bc73a415176201f7c1cbab4867fed34d781b028bf7cc5ea158838b415194068855fa18fd61da60c8fc3734637e08ddb0ad6720259a12a96ac1f283dff14aa573a7db8c6cb8207cce24987b757fd8f82be93fab4f47f5da169f76e0def1557ba9b0dcf9e58a5ed96") r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x3c, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000180)={0x1, 0x7f}, 0x8) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f0000000140)) 12:02:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cPecksum'}]}) 12:02:12 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffff00000002, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:02:12 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xf6ffffff00000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:02:12 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x5000, &(0x7f00000004c0)) [ 1454.501895][ T6354] EXT4-fs (sda1): Unrecognized mount option "journal_cPecksum" or missing value 12:02:12 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x24) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000080)={0xa, 0x9, 0x100000001, 0x1}, 0xa) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) 12:02:12 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffff00005421, &(0x7f0000000000)="5d9146e03ef9c237076054") [ 1454.659619][ T6368] EXT4-fs (sda1): Unrecognized mount option "journal_cPecksum" or missing value 12:02:12 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xf8f73f0000000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:02:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cQecksum'}]}) 12:02:12 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) write$FUSE_LK(r1, &(0x7f00000000c0)={0x28, 0x0, 0x3, {{0x6, 0x8001, 0x0, r2}}}, 0x28) 12:02:12 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffff00005450, &(0x7f0000000000)="5d9146e03ef9c237076054") [ 1454.903675][ T6382] EXT4-fs (sda1): Unrecognized mount option "journal_cQecksum" or missing value [ 1455.019504][ T6389] EXT4-fs (sda1): Unrecognized mount option "journal_cQecksum" or missing value 12:02:13 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x800, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v2={0x2000000, [{0x20}, {0x10000, 0x9}]}, 0x14, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in6}}, &(0x7f0000000880)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000008c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}}}, &(0x7f00000009c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000a00)={{{@in=@loopback, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000b00)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000b40)={0x0, 0x0, 0x0}, &(0x7f0000000b80)=0xc) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getgid() getgroups(0x1, &(0x7f0000000d00)=[0xee00]) getgroups(0x4, &(0x7f0000000d40)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xee00]) fsetxattr$system_posix_acl(r0, &(0x7f0000000740)='system.posix_acl_access\x00', &(0x7f0000000d80)={{}, {0x1, 0x2}, [{0x2, 0x1, r1}, {0x2, 0x0, r2}, {0x2, 0x4, r3}], {0x4, 0x4}, [{0x8, 0x6, r4}, {0x8, 0x1, r5}, {0x8, 0x5, r6}, {0x8, 0x4, r7}, {0x8, 0x4, r8}, {0x8, 0x4, r9}], {0x10, 0x6}, {0x20, 0x3}}, 0x6c, 0x0) r11 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r11, &(0x7f0000000240)=ANY=[@ANYPTR64], 0xfffffffffffffd9d) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000100)={0x7, 0x0, [], {0x0, @bt={0x8001, 0x68c1dd49, 0x0, 0x3, 0x1ff, 0x0, 0x8, 0x65c, 0x4, 0x705, 0x6, 0x3, 0x100000000, 0x0, 0x0, 0xc}}}) fcntl$notify(r0, 0x402, 0x0) getgroups(0x4, &(0x7f0000000e00)=[r7, r4, r9, r10]) r12 = mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r11, 0x0) ioctl$BINDER_WRITE_READ(r11, 0xc0306201, &(0x7f0000000700)={0x130, 0x0, &(0x7f0000000580)=[@reply={0x40406301, {0x3, 0x0, 0x3, 0x0, 0x10, 0x0, 0x0, 0x40, 0x18, &(0x7f0000000200)=[@ptr={0x70742a85, 0x1, &(0x7f00000001c0), 0x1, 0x3, 0x17}, @flat={0x776a2a85, 0x10b, r12}], &(0x7f0000000280)=[0x38, 0x28, 0x78]}}, @acquire={0x40046305, 0x4}, @exit_looper, @transaction={0x40406300, {0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x48, 0x30, &(0x7f00000002c0)=[@flat={0x776a2a85, 0x100, r12}, @fd={0x66642a85, 0x0, r11, 0x0, 0x4}, @flat={0x73622a85, 0x100, r12, 0x3}], &(0x7f0000000340)=[0x18, 0x48, 0x0, 0x0, 0x38, 0x38]}}, @transaction={0x40406300, {0x2, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x30, 0x28, &(0x7f0000000380)=[@fd={0x66642a85, 0x0, r11, 0x0, 0x3}, @flat={0x73622a85, 0x10a, r12, 0x1}], &(0x7f00000003c0)=[0x40, 0x38, 0x0, 0x38, 0x38]}}, @acquire_done={0x40106309, r12}, @transaction={0x40406300, {0x3, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x50, 0x28, &(0x7f0000000500)=[@ptr={0x70742a85, 0x0, &(0x7f0000000400), 0x1, 0x4, 0x16}, @ptr={0x70742a85, 0x1, &(0x7f0000000440), 0x1, 0x2, 0x17}], &(0x7f0000000480)=[0x78, 0x0, 0x78, 0x40, 0x58]}}], 0x3, 0x0, &(0x7f00000006c0)="1d9add"}) ioctl$int_in(r11, 0x800c5012, &(0x7f00000004c0)) 12:02:13 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffff00005451, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:02:13 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0x5, &(0x7f0000000380)) 12:02:13 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xfcfdffff00000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:02:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cRecksum'}]}) 12:02:13 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x5001, &(0x7f00000004c0)) [ 1455.644591][ T6398] EXT4-fs (sda1): Unrecognized mount option "journal_cRecksum" or missing value 12:02:13 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x2, 0x0) io_setup(0x4, &(0x7f0000000040)=0x0) io_cancel(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2, 0xff, r0, &(0x7f0000000080)="df948dba53ac90bea6a75f466a5963d69bbe1112a58c39117df1d1b64dce0c4c5a34197f839ec01364f1ba1fbbcc2ab1c076bc4ab55d4f1614a978170e00ce18865424fc8a783906f5fbbc8c076de76e32e4d6a5e15c66f4df88c3adb18321f655", 0x61, 0x7fff, 0x0, 0x0, r0}, &(0x7f0000000140)) fchdir(r0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) 12:02:13 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x10000, 0x10) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f00000000c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 12:02:13 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffff00005452, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:02:13 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x2200, 0x0) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000080)={0x7, {0x8, 0x100000000, 0xc0}}) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) 12:02:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cSecksum'}]}) 12:02:13 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xfdfdffff00000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:02:13 executing program 5: syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x80000001, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x1, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0xffffffff}, 0x1c) listen(r1, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000440)='/dev/cec#\x00', 0x0, 0x2) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U+', 0x101}, 0x28, 0x1) r3 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r3, &(0x7f0000e11ff0)=[{&(0x7f0000000180)="580000001400add427323b470c458c560a067fffffff81004e22000000050028925aa80000007b00090080000efffeffe809000000ff0000100003fffffffffffff000cfb193e7ee00000000000000000000000000000000", 0x58}], 0x1) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r0, 0x28, &(0x7f0000000100)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r4, 0x3, 0x4000000000000d}, 0xc) write$FUSE_STATFS(r0, &(0x7f0000000080)={0x60, 0x0, 0x8, {{0x0, 0x1ff, 0xab29, 0xecf, 0xffffffff, 0x9, 0x5, 0x7}}}, 0x60) connect$x25(r0, &(0x7f0000000300)={0x9, @remote={[], 0x2}}, 0x12) set_robust_list(&(0x7f00000002c0)={&(0x7f0000000200)={&(0x7f00000001c0)}, 0x4, &(0x7f0000000280)={&(0x7f0000000240)}}, 0x18) open_by_handle_at(r3, &(0x7f0000000340)={0xfa, 0xffcb, "f949beae1408317e6b6c0360fd06631198f47ca61dec836dcbbaa8c3a42796aefb99b9f54dc2d58005dd8a2bafb475ca6b67c5dd8dc95d1f9cbb67cd5cae25b79aadaa7bffc4ad8bc620e38fdc4ce45c730f21161e91e882f17ff6dbad8ea96c030ec3ae125b104e9532792fe91ecd08ea1ed56c99f7cc383fa94ca6e26955253bcc69499673633db20cf2d07d082c463a2e50de176984d2ca56fd0f522999cdbc3bfba8362c39cc27f2bfe67273de3fbf81f2373cf5c3ebff77b224fe67a2a29796c76462e01907b541c73f55551b8941d3eafe072cce6fb62800f8f96963cdeb59dddb8a5f5518e82158d1c4ca17318d8e"}, 0x80) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) 12:02:13 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffff00005460, &(0x7f0000000000)="5d9146e03ef9c237076054") [ 1455.950575][ T6425] EXT4-fs (sda1): Unrecognized mount option "journal_cSecksum" or missing value 12:02:13 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffff00000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:02:13 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x8100) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) fcntl$lock(r0, 0x0, &(0x7f0000000140)={0x0, 0x2, 0x6, 0xacb2, r2}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000001c0)=0x6688e677, &(0x7f0000000180)=0x4) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) write$FUSE_LSEEK(r1, &(0x7f0000000080)={0x18, 0x0, 0x5, {0x6}}, 0x18) 12:02:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cTecksum'}]}) 12:02:14 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x5008, &(0x7f00000004c0)) 12:02:16 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000040)=0x6) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) 12:02:16 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0xd0, 0x4000000000101002) 12:02:16 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffff40049409, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:02:16 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:02:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cUecksum'}]}) 12:02:16 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x500e, &(0x7f00000004c0)) [ 1458.950117][ T6463] EXT4-fs: 3 callbacks suppressed [ 1458.950128][ T6463] EXT4-fs (sda1): Unrecognized mount option "journal_cUecksum" or missing value 12:02:16 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x6, 0xfffffffffffffffd) r1 = open(&(0x7f0000000000)='./file0\x00', 0x44400, 0x4) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x61000a40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)={0x1b0, r2, 0x300, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0xac, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7e5c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1277}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}]}]}, @TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7ff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9a}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x1b0}}, 0x40) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) 12:02:16 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffff4020940d, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:02:17 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) [ 1459.142216][ T6476] EXT4-fs (sda1): Unrecognized mount option "journal_cUecksum" or missing value 12:02:17 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}, 0x2d}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:02:17 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) 12:02:17 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xc0045878, &(0x7f0000000000)="5d9146e03ef9c237076054") [ 1459.368780][ T6486] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_blks=0x0000000000000000-" or missing value 12:02:19 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) write$binfmt_misc(r0, &(0x7f0000000200)={'syz0', "d4d89d46d5c18674acbdebabc29ed65e9a058f7a04efffa71316fa72e75107fb3c8020cfa0cf8a2378f7fa3757e70c7e9c0a2591fb69caa3d60b"}, 0x3e) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000040)={0x3, 0x7f, 0x4, 0x4, 0x9, 0x8, 0x2}, 0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000080)={0x0, 0x35, "e46c23d45d4a10fb743e1cf1c8325f1864147d2556b37794a288367d52f74ccb305ad083927b708fb9dbbdf995bf9e6ac6fb88d90e"}, &(0x7f00000000c0)=0x3d) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000280)={r0, 0x0, 0x4, 0x70ea, 0x35c}) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000100)={r1, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0xe3a}, &(0x7f00000001c0)=0x90) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000002c0)={0x0, r0, 0x401, 0x5, 0x17e1, 0x1ff}) 12:02:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cVecksum'}]}) 12:02:19 executing program 5: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000080)=0x10, 0x80800) lseek(r0, 0x0, 0x3) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r1, 0xfffffffffff7ffbd, &(0x7f0000000380)) 12:02:19 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffffc0045878, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:02:19 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x2}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:02:19 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x5015, &(0x7f00000004c0)) [ 1462.007558][ T6503] EXT4-fs (sda1): Unrecognized mount option "journal_cVecksum" or missing value 12:02:19 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0xfffffffffffffffe) ioctl(r0, 0xfffffffffff7ffba, &(0x7f0000000080)="331995e1d2c519818f92e06dceaac98c4bce3000e15e9c61c403961e7331e1ce4c174446f449ff39a757bb4939de613e28b6021d2262e8782af31c8f9b73ed4a2645269739bde3ad97e2bce3523f753a651dfb6161e8198000000000000000000000") r1 = dup(r0) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xf, 0x4, 0x3, 0x4000, r0}) connect$pptp(r1, &(0x7f0000000300)={0x18, 0x2, {0x2, @broadcast}}, 0x1e) 12:02:20 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffffc0189436, &(0x7f0000000000)="5d9146e03ef9c237076054") [ 1462.127369][ T6512] EXT4-fs (sda1): Unrecognized mount option "journal_cVecksum" or missing value 12:02:20 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x6, 0x40000) shutdown(r0, 0x1) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r1, 0xfffffffffff7ffbd, &(0x7f0000000380)) 12:02:20 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x3}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:02:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cWecksum'}]}) 12:02:20 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000100)="5b2f0da56bb594b5a01fabc319aedf68308e180e07bc4a3ebda5e1b4c97d058658584c5c055d5a56b6d0525546869e4a55ca943cf71486755cb33985400705b4896d3891b39364f56992a0f31540d7caab1d557086") [ 1462.355647][ T6528] EXT4-fs (sda1): Unrecognized mount option "journal_cWecksum" or missing value [ 1462.533770][ T6536] EXT4-fs (sda1): Unrecognized mount option "journal_cWecksum" or missing value 12:02:22 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f0000000040)) 12:02:22 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffffc020660b, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:02:22 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x4}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:02:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cXecksum'}]}) 12:02:22 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x5016, &(0x7f00000004c0)) [ 1465.138699][ T6547] EXT4-fs (sda1): Unrecognized mount option "journal_cXecksum" or missing value [ 1465.238786][ T6545] EXT4-fs (sda1): Unrecognized mount option "" or missing value 12:02:23 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffc9, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:02:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cYecksum'}]}) 12:02:23 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x5}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1465.485012][ T6560] EXT4-fs (sda1): Unrecognized mount option "journal_cYecksum" or missing value 12:02:23 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c23764f19a") [ 1465.611223][ T6567] EXT4-fs (sda1): Unrecognized mount option "journal_cYecksum" or missing value 12:02:23 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x6}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:02:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cZecksum'}]}) [ 1465.924473][ T6576] EXT4-fs (sda1): Unrecognized mount option "journal_cZecksum" or missing value [ 1466.023766][ T6582] EXT4-fs (sda1): Unrecognized mount option "journal_cZecksum" or missing value 12:02:33 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x4, 0x4000) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) r1 = socket$inet_udp(0x2, 0x2, 0x0) clock_settime(0x7, &(0x7f0000000000)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='comm\x00') ioctl$SIOCAX25DELFWD(r2, 0x89eb, &(0x7f0000000200)={@default, @default}) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f00000000c0)={0x69d6, {{0x2, 0x4e22, @loopback}}}, 0x88) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x20) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000180)="e5c608420490a245601d06dec41d52ce", 0x10) 12:02:33 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x7}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:02:33 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076047") 12:02:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c[ecksum'}]}) 12:02:33 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f00000004c0)) 12:02:33 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f0000000080)) setsockopt$ax25_SO_BINDTODEVICE(r0, 0x101, 0x19, &(0x7f0000000040)=@netrom={'nr', 0x0}, 0x10) ioctl$TCFLSH(r0, 0x540b, 0x9) [ 1475.311069][ T6589] EXT4-fs (sda1): Unrecognized mount option "journal_c[ecksum" or missing value 12:02:33 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) [ 1475.353046][ T6600] EXT4-fs (sda1): Unrecognized mount option "" or missing value 12:02:33 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) read(r0, &(0x7f0000000080)=""/70, 0x46) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) [ 1475.416726][ T6602] EXT4-fs (sda1): Unrecognized mount option "journal_c[ecksum" or missing value 12:02:33 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") socket$tipc(0x1e, 0x2, 0x0) 12:02:33 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x8}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:02:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c\\ecksum'}]}) [ 1475.651886][ T6611] EXT4-fs (sda1): Unrecognized mount option "" or missing value 12:02:33 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x42000, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") [ 1475.714188][ T6617] EXT4-fs (sda1): Unrecognized mount option "journal_c\ecksum" or missing value 12:02:33 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x9}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1475.838607][ T6623] EXT4-fs (sda1): Unrecognized mount option "journal_c\ecksum" or missing value 12:02:33 executing program 0: syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) 12:02:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c]ecksum'}]}) [ 1475.942174][ T6627] EXT4-fs (sda1): Unrecognized mount option " " or missing value 12:02:33 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x20001, 0x60200) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") [ 1476.070098][ T6633] EXT4-fs (sda1): Unrecognized mount option "journal_c]ecksum" or missing value [ 1476.187858][ T6639] EXT4-fs (sda1): Unrecognized mount option "journal_c]ecksum" or missing value 12:02:34 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x5450, &(0x7f00000004c0)) 12:02:36 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYRESHEX=0x0, @ANYRES16=r0], @ANYPTR=&(0x7f0000000100)=ANY=[@ANYRESOCT=r0, @ANYRESHEX=r0, @ANYRESDEC=r0, @ANYRESDEC=r0, @ANYRESHEX=0x0, @ANYRES32=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRES64=r0, @ANYRES32=r0], @ANYRESHEX, @ANYRES64=r0, @ANYBLOB="be5ab852aa6ad2d73f32e2465cc334f6e9cceea5b618cbf63e3e107e078ab73bfd7b0abf2ca8bbd01a5470fb607e829a5225a2afa37e5b0d4ef3b6168d1a73e700d722f3d7a08095c102393dd2e5dabebbd37f8e167082fc15b054f1c2828123741cb39f10c055be47f57d538bbb76b0fade1ff75e8f00b692565a44aca76aab8af6edd9abf4bece46d3e6a015804a3bf728d82a7f1aa5b9ba6fa61ed11c76a5b34a18598a6fa2eaa9a4e743e7f2a26aa8a680b68437b9a0afa6"], 0x2) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x5, 0x48000) 12:02:36 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x10}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:02:36 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x1f, 0x800) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f00000000c0)={0x0, 0x0, 0x2080}) ioctl(0xffffffffffffffff, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:02:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c^ecksum'}]}) 12:02:36 executing program 5: r0 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x3ff, 0x800) ioctl$RTC_WIE_OFF(r0, 0x7010) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x66) ioctl$RTC_EPOCH_READ(r2, 0x8008700d, &(0x7f0000000080)) ioctl$DRM_IOCTL_SET_VERSION(r1, 0xc0106407, &(0x7f00000000c0)={0x100, 0x1ff, 0x4, 0x8b}) ioctl(r1, 0xfffffffffff7ffba, &(0x7f00000001c0)="e78275e23c1579b519504308e878bf1e5f3b1510ec6f3d49c2c7d9000000000000") 12:02:36 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x5451, &(0x7f00000004c0)) [ 1478.374676][ T6654] EXT4-fs (sda1): Unrecognized mount option "journal_c^ecksum" or missing value 12:02:36 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x40000000000f2e, &(0x7f0000000100)="fdc8c3063aa32adee063762ccc31") r1 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x10000280800, 0x0) getsockopt$ax25_int(r1, 0x101, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) 12:02:36 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000080)) socket$nl_generic(0x10, 0x3, 0x10) 12:02:36 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x4cd, 0xfffffffffffffffd) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000080)={0x543, 0x3, 0x9, {0x0, 0x1c9c380}, 0x4, 0x774a}) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f0000000100)) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) 12:02:36 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x2d}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:02:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c_ecksum'}]}) 12:02:36 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xffffffffffffffff, 0x200000) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:02:39 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f00000002c0)=ANY=[], 0xffffffffffffffee) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) 12:02:39 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x7f, 0x100000000) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) 12:02:39 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) socket$kcm(0x29, 0x400000000002, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000080)={0x0, @rand_addr, @remote}, &(0x7f0000000100)=0xc) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') syz_open_dev$sndpcmp(0x0, 0x9, 0x100) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) preadv(r2, &(0x7f00000017c0), 0x3da, 0x7e362c00) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:02:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_c`ecksum'}]}) 12:02:39 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x48}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:02:39 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000004c0)) [ 1481.421746][ T6696] EXT4-fs: 4 callbacks suppressed [ 1481.421760][ T6696] EXT4-fs (sda1): Unrecognized mount option "journal_c`ecksum" or missing value 12:02:39 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x2) r1 = dup(r0) ioctl(r0, 0x40, &(0x7f0000000380)) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000340)=""/138) sendto$unix(0xffffffffffffffff, &(0x7f0000000080)="4932d83f80fd0d8d3c8eadf6416e3fb835f6c8b89c415b69a00b797f10305e039ea4f4e41c350c33008eed5bef40fba529e0562cfda7f8c80da0725b2ef40c5ea5c0bc7c32e6abc6a19923944643b24f5fa93395bcda1222f6096fab70f91bbdb125db39dd3f8f5784c6c31022efc68dda9dbf500f881440000e9d918f10d6573e36b5ddeb99712ffcf1d101536abf767021661eedf9af097173b03460f1821a9b9483e52373859fd4267189bbe7e581a875aa4a45377c798cb898bfae3027cfebb8548699e74354273019b3fd6a2e1b7552be4e9394536088dbabc7bde7697fee20e1d44657959f3c959760", 0xec, 0x8000, &(0x7f0000000180)=@abs={0x1, 0x0, 0x4e22}, 0x6e) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000200)={0x9}) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000280)={0xffffffffffffffff, 0x3, 0xffff, "a0f3e11aac7d92ab9bc417e4a10c93f873f58eaa0de43d93162833e379acf533c0f50578eca0bf2ce2a085f158f6d044319e4fbe0afd3cbfe387b075be5fe0605e3aee18de3096a61d99a44ee99208393be74b9c7d41801cfeaa9cbc519f76a5ab3508bee7852fa6302b6693f1e7339f5da756a2903844a7bb4279d8b2a1dd019c7dce73d2a18a4018c5b3c9bb85897482942f47"}) 12:02:39 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) creat(&(0x7f0000000000)='./file0\x00', 0xc4) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f0000000040)) [ 1481.505108][ T6699] EXT4-fs (sda1): Unrecognized mount option "H" or missing value 12:02:39 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x109100, 0x0) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000140)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x2, 0x64}) [ 1481.553749][ T6713] EXT4-fs (sda1): Unrecognized mount option "journal_c`ecksum" or missing value 12:02:39 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x4c}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:02:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_caecksum'}]}) 12:02:39 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0xfffffffffffffff8, 0x200) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x18, r2, 0xb00, 0x70bd2a, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) 12:02:39 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200002, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, 0x0, &(0x7f00000001c0)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x210070}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000b458dab38450be3afb6f15b784ca0fef48eaf2b5966641acd3c0b1327eec0beb8793018ca8f549750fb56692b671a2c062961fd7e05591948bc3b1f538dc2f8dc8ca37c21602c7948b692d6df80c5611a779930d07c9473754d2985d019ca67bae482b9b291c799eb4f390a7a42e8590b9b77f78d7b43b060042f9f9cd6e22cb6e5e", @ANYRES16=r2, @ANYBLOB="020427bd7000fbdbdf25010000000800060008000000"], 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) [ 1481.752407][ T6722] EXT4-fs (sda1): Unrecognized mount option "L" or missing value [ 1481.826770][ T6727] EXT4-fs (sda1): Unrecognized mount option "journal_caecksum" or missing value [ 1481.940145][ T6736] EXT4-fs (sda1): Unrecognized mount option "journal_caecksum" or missing value 12:02:39 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffff7ffff7ffba, &(0x7f0000000500)="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") ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000080)={r1, 0x8}) 12:02:40 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x521c1, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 12:02:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cbecksum'}]}) 12:02:40 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x68}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1482.356939][ T6744] EXT4-fs (sda1): Unrecognized mount option "journal_cbecksum" or missing value 12:02:40 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x5460, &(0x7f00000004c0)) 12:02:40 executing program 5: syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x3, 0x40000) r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x5, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) [ 1482.446798][ T6745] EXT4-fs (sda1): Unrecognized mount option "h" or missing value [ 1482.505964][ T6753] EXT4-fs (sda1): Unrecognized mount option "journal_cbecksum" or missing value 12:02:42 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="7615614eedf4aad854167dd3cd613939", 0x10) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) getxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.', '-bdevem0:/vmnet1*g:wlan0security\x00'}, &(0x7f0000000100)=""/37, 0x25) 12:02:42 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000080)={0x0, 0x4, 0x7, 0x1, &(0x7f0000ffc000/0x4000)=nil, 0x2}) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f00000000c0)="5d606a797c017d6ee98bc09c67752468cc4d7d124c6743c1fffffff1b561fbe4e44de78a5b781f") r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101000, 0x0) write$apparmor_current(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7065726d686174203078303030303030303030303030303030335e80c7a90d401ed0d5343821ed883649752287a8bf7bf68bb2045c67de3fbcc3aba1e797261b47622f38bc86cb6379842ca41c75a4b4a77987f6d268cba52df9b69d30919f283a1374f91c1b9d94c862187126f2478e9e7e63c45e1c0c7b3a476dfa77723d356ec92b8d5b7cea1eff833f73ad41b77e01b5f2f06cc6133033aa31c1d96832d4acd906537adfc0b8ce94e884ef4e9b8144ebc55d5a8dae3b42b15cf23fb647e7c8b380bbd0f97410860b00000000000000000000000000"], 0x1b) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) 12:02:42 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000080)={0xe, &(0x7f0000000000)=""/14}) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) 12:02:42 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x6c}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:02:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_ccecksum'}]}) 12:02:42 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x40045010, &(0x7f00000004c0)) 12:02:42 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40000, 0x0) ioctl$VIDIOC_G_OUTPUT(r0, 0x8004562e, &(0x7f0000000080)) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r1, 0xfffffffffff7ffbd, &(0x7f0000000380)) [ 1484.644235][ T6770] EXT4-fs (sda1): Unrecognized mount option "journal_ccecksum" or missing value 12:02:42 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000380)) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f00000000c0)={0x2, 0x6, 0x527, 0xf5f, 0x9a6c}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'team_slave_1\x00', {0x2, 0x4e1e, @loopback}}) [ 1484.719685][ T6781] Unknown ioctl -2147199442 [ 1484.725663][ T6781] Unknown ioctl -2147199442 12:02:42 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x74}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:02:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cdecksum'}]}) 12:02:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) bind$can_raw(r1, &(0x7f0000001640)={0x1d, r2}, 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000040)="92a88ed40ca365e96b138d573ae703afe0680a8d7ef762f39fd569379a4b643ec44dc737f5953735c9e86297d2a3cbc679e5a12ea1e14a8b68f6cdcd62e119311b04ba5e0effc1dd46fbba8099ea73aa23f5de9a0523e61fafb03fe7682d9ce61c0450032e369ce18a7ea3bd10e75a4efdecd23143c9bd8d", 0x78) dup3(r0, r1, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r3, 0xfffffffffff7ffbd, &(0x7f0000000380)) 12:02:42 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000080)="da") 12:02:45 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) ioctl$PPPIOCGDEBUG(r0, 0x80047441, &(0x7f0000000040)) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) sendfile(r0, r0, 0x0, 0x4) getsockopt$nfc_llcp(r0, 0x118, 0x5, &(0x7f0000000080)=""/112, 0x70) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) ioctl$TCFLSH(r0, 0x540b, 0x7ff) 12:03:04 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x40045017, &(0x7f00000004c0)) 12:03:05 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f0000000040)=0x1800000000000) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000002, 0x1014, r0, 0x0) read(r0, &(0x7f0000000080)=""/164, 0xa4) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) 12:03:05 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x7a}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_ceecksum'}]}) 12:03:05 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000040)="5d353ee9224487f8cca750704373280d9146e073f9c237076054") 12:03:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fe, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) syz_open_dev$rtc(&(0x7f0000000580)='/dev/rtc#\x00', 0x4, 0x6000) r2 = msgget(0xffffffffffffffff, 0x2a0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xfd4f) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r1, &(0x7f00000007c0)={0xa0, 0x19, 0x1, {0xa08, {0xb, 0x3}, 0x3, r3, 0x0, 0x4e, 0x20, 0x9, 0x6, 0xffffffffffffff96, 0x3, 0x0, 0x101, 0x3, 0x0, 0x7, 0x6, 0xba0, 0x7a2, 0x401}}, 0xa0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000480)) setuid(r4) msgctl$MSG_STAT(r2, 0xb, &(0x7f0000000340)=""/35) sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x1}, &(0x7f0000000400)=0x8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendmmsg(r0, &(0x7f0000000440)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="884d87488a965b9f0b592268f469c360c6f5de3dfc70f9caf2cf86725cd0508c91e60214340b6e1e369a71e24a5568e602cc5cf20efae90341d7d5de5c8b8016a7d4998f215e76e5ec481d7bc8342c7e6b2ff3d3036baf28a1ebef0d6fca7de5f9d7b604d5a9aabb8d83935cfe7c6333cd", 0x71}], 0x1, 0x0, 0x0, 0x8000}}], 0x1, 0x20040000) sendto$inet(r0, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000300), 0x8) setsockopt$inet6_dccp_buf(r1, 0x21, 0xcf, &(0x7f0000000880)="74d417d77be9ec2ea01b00f734e3bd72da840be90cc70dac09819eee29b6fe0e7c50a4cac143ecfb5d51eecd9cba2cb037f74f6546aa3e512aafe26f84137de415bf520f10b04c62de79649a533df3dbd3637e480cdadd6084809a14785cd229dacd9be3c6753e17fdf6509c8d0899bc5e83d2a0a6a881d5ff86fb3bc31cdb8d97015d3d1d7bc0159d8e86178945639dacd4152f5317", 0x96) [ 1507.396234][ T6819] EXT4-fs: 5 callbacks suppressed [ 1507.396247][ T6819] EXT4-fs (sda1): Unrecognized mount option "journal_ceecksum" or missing value [ 1507.473817][ T6814] EXT4-fs (sda1): Unrecognized mount option "z" or missing value [ 1507.543600][ T6826] EXT4-fs (sda1): Unrecognized mount option "journal_ceecksum" or missing value 12:03:05 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0xc0}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cfecksum'}]}) 12:03:05 executing program 5: socket$inet(0x2, 0x2, 0x0) socket(0x1e, 0x4, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 1507.743330][ T6831] EXT4-fs (sda1): Unrecognized mount option "journal_cfecksum" or missing value [ 1507.883112][ T6837] EXT4-fs (sda1): Unrecognized mount option "journal_cfecksum" or missing value 12:03:05 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x300}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cgecksum'}]}) [ 1508.109894][ T6846] EXT4-fs (sda1): Unrecognized mount option "journal_cgecksum" or missing value [ 1508.201634][ T6844] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, 12:03:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_ch\ncksum'}]}) 12:03:06 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x500}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1508.380829][ T6855] EXT4-fs (sda1): Unrecognized mount option "journal_ch [ 1508.380829][ T6855] cksum" or missing value [ 1508.458604][ T6858] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, [ 1508.552106][ T6861] EXT4-fs (sda1): Unrecognized mount option "journal_ch [ 1508.552106][ T6861] cksum" or missing value 12:03:06 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) 12:03:06 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x40049409, &(0x7f00000004c0)) 12:03:06 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x600}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_ch%cksum'}]}) 12:03:15 executing program 0: openat$sequencer(0xffffffffffffff9c, 0x0, 0x801, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000640)={"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"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000040)=0x2) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000001c0), 0x0, r1}, 0x68) syz_open_pts(0xffffffffffffffff, 0x7fc) write$sndseq(0xffffffffffffffff, 0x0, 0x300) r3 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r3, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x12000, 0x0) getsockopt$inet6_mreq(r4, 0x29, 0x14, &(0x7f00000000c0)={@local}, &(0x7f0000000100)=0x14) 12:03:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f00000003c0)=0x400300000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2002102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000380)=[@window={0x3, 0x0, 0x800}, @mss], 0x2037) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x0, 0x0}, 0x10) 12:03:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_chhcksum'}]}) 12:03:15 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x700}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:15 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x4020940d, &(0x7f00000004c0)) 12:03:15 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) [ 1517.823046][ T6891] EXT4-fs: 2 callbacks suppressed [ 1517.823058][ T6891] EXT4-fs (sda1): Unrecognized mount option "journal_chhcksum" or missing value [ 1517.873036][ T6893] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, 12:03:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_che\nksum'}]}) 12:03:15 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x900}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1518.110596][ T6905] EXT4-fs (sda1): Unrecognized mount option "journal_che [ 1518.110596][ T6905] ksum" or missing value [ 1518.212276][ T6903] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, [ 1518.256323][ T6909] EXT4-fs (sda1): Unrecognized mount option "journal_che [ 1518.256323][ T6909] ksum" or missing value 12:03:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_che#ksum'}]}) 12:03:16 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0xf19}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1518.503524][ T6920] EXT4-fs (sda1): Unrecognized mount option "journal_che#ksum" or missing value 12:03:16 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x8000000000000000) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") [ 1518.594715][ T6923] EXT4-fs (sda1): Unrecognized mount option "" or missing value 12:03:16 executing program 5: r0 = socket$inet(0x2, 0xa, 0xffffffff) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_GET_KEEPCAPS(0x7) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) recvfrom(r3, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$RTC_WIE_OFF(r1, 0x7010) flock(r0, 0x2) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_opts(r3, 0x0, 0xd, &(0x7f0000000180)="cfeaab1d6e3cf634eaecdfc24c0b981cf0b36c3d627a9c1f2507becd76", 0x1d) sendto$inet(r3, 0x0, 0x0, 0x400200007fd, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_elf64(r3, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000300)={'yam0\x00', {0x2, 0x4e21, @multicast2}}) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000380)) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) getsockopt$sock_int(r2, 0x1, 0x2e, 0x0, 0x0) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f00000007c0)={'filter\x00', 0x7, 0x4, 0x4a4, 0x0, 0x140, 0x280, 0x3c0, 0x3c0, 0x3c0, 0x4, &(0x7f00000000c0), {[{{@arp={@local, @broadcast, 0xff, 0xff000000, @mac=@broadcast, {[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, @mac, {[0x0, 0xff, 0xff, 0x0, 0x0, 0xff]}, 0xfaa, 0x3, 0x7, 0x800, 0x4, 0x6, 'ipddp0\x00', 'gretap0\x00', {}, {0xff}, 0x0, 0x21}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="39e65782bb8d", @empty, @multicast1, @dev={0xac, 0x14, 0x14, 0x27}, 0xf, 0xffffffff}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@dev={[], 0x1b}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x26}, 0x1}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @empty, @rand_addr=0x8, @dev={0xac, 0x14, 0x14, 0x4}, 0xc, 0xffffffff}}}], {{[], 0xc0, 0xe4}, {0x24}}}}, 0x4f0) [ 1518.673587][ T6926] EXT4-fs (sda1): Unrecognized mount option "journal_che#ksum" or missing value 12:03:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_che%ksum'}]}) 12:03:16 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x190f}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1518.788268][ T6934] syz-executor5 uses obsolete (PF_INET,SOCK_PACKET) 12:03:16 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x80044d76, &(0x7f00000004c0)) [ 1518.850828][ T6936] EXT4-fs (sda1): Unrecognized mount option "journal_che%ksum" or missing value [ 1518.940809][ T6940] EXT4-fs (sda1): Unrecognized mount option "" or missing value 12:03:16 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000100)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r2, 0x400, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x40045) 12:03:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_che*ksum'}]}) 12:03:18 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)="fc5f5a03c96c86dda607dcbe4f08b31ff9909f3cf619a51b3aae8be36fdafbb80b7a757c5315010b4f2799e968a79ae96373e3e183741a9908f351141ada00bdf3ebef33ce2a5419e6dec3c575dc78d0aeccd7c688092b3098ebffff0bd1cf32709cf9be1c86eaa37f468641f366684d641ec4d6a40b83a5059b00ea70975a76dc7f700429456f3f6139478fe374e06bab048c71573cd0148cb2b752e2574eca2fc719d9c7a3e62072411929e2beba769488df3652c9ece0ac391a4d4d7f4b9564fb05aa7af7bf0d3ec751c8", 0xcc, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) 12:03:18 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x1f00}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:18 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x200000000400) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:03:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_che+ksum'}]}) 12:03:18 executing program 5: clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) stat(0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x5, 0x400000, 0xca}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 12:03:18 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x80044df9, &(0x7f00000004c0)) 12:03:18 executing program 5: socket$inet(0x2, 0x2, 0x0) socket(0x1e, 0x4, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:03:18 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8, 0x800) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x488082, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f00000000c0)={0x2, 0x5}) 12:03:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_che-ksum'}]}) 12:03:18 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x2000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:19 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000000140)={0x1fe, 0x0, &(0x7f0000ffb000/0x4000)=nil}) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r1, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f00000000c0)={0x3}) recvfrom$inet6(r2, &(0x7f0000000180)=""/245, 0xf5, 0x40, &(0x7f0000000280)={0xa, 0x4e24, 0x1, @rand_addr="9ec07306a2099934d997dc3227d3173c", 0x7cb}, 0x1c) 12:03:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_che.ksum'}]}) 12:03:21 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0xc919114393d385a1) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x178, r2, 0x704, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x48, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x88ec}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffffffe}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_BEARER={0x7c, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffff7}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xffffffffffff64a9}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x3, @loopback, 0x4}}}}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_BEARER={0x60, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'irlan0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x82af}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4000000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}]}, 0x178}}, 0xc800) 12:03:21 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) 12:03:21 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x2d00}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = timerfd_create(0x0, 0x0) timerfd_settime(r1, 0x0, 0x0, &(0x7f000000ffe0)) read(r1, &(0x7f0000a16000)=""/71, 0x47) 12:03:21 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x80045002, &(0x7f00000004c0)) 12:03:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_che0ksum'}]}) [ 1523.912393][ T7023] EXT4-fs: 11 callbacks suppressed [ 1523.912405][ T7023] EXT4-fs (sda1): Unrecognized mount option "journal_che0ksum" or missing value [ 1524.018791][ T7020] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, 12:03:22 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x3f00}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:22 executing program 0: getpeername(0xffffffffffffff9c, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000100)=0x80) recvfrom(r0, &(0x7f0000000140)=""/83, 0x53, 0x1, &(0x7f00000001c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @local}}, 0x80) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r1, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:03:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cheXksum'}]}) [ 1524.268613][ T7038] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, [ 1524.283918][ T7042] EXT4-fs (sda1): Unrecognized mount option "journal_cheXksum" or missing value 12:03:22 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U-', 0x7}, 0x28, 0x3) 12:03:22 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x4000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1524.383658][ T7048] EXT4-fs (sda1): Unrecognized mount option "journal_cheXksum" or missing value 12:03:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_chedksum'}]}) [ 1524.512640][ T7051] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, 12:03:22 executing program 0: r0 = dup(0xffffffffffffff9c) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f00000001c0)=0xffffffffffffffff) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r1, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x0}, {}, {}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000140)={r2, &(0x7f0000000100)=""/5}) [ 1524.631480][ T7058] EXT4-fs (sda1): Unrecognized mount option "journal_chedksum" or missing value [ 1524.731749][ T7065] EXT4-fs (sda1): Unrecognized mount option "journal_chedksum" or missing value 12:03:24 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x0}, {}]}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f00000000c0)={r1, 0x2}) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) 12:03:24 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x4800}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:24 executing program 5: r0 = creat(0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f00000000c0)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) getegid() stat(0x0, 0x0) lstat(&(0x7f00000004c0)='./file0\x00', 0x0) getgroups(0x0, &(0x7f0000000580)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x3d58e726}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) 12:03:24 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='cpuset\x00') getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f00000000c0)={'mangle\x00', 0x48, "0d3a6658b6a4087e47a9f52af0d07394d78095bc5d4e3118cc4a983fb93b3643798119521689c963fd5835e19f3e80a0a61fa465356aee7bd363bc8d723ec71e501b6ac6c9d9c9f7"}, &(0x7f0000000140)=0x6c) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:03:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_chehksum'}]}) 12:03:24 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x80045005, &(0x7f00000004c0)) [ 1526.971843][ T7074] EXT4-fs (sda1): Unrecognized mount option "journal_chehksum" or missing value [ 1527.052897][ T7077] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, 12:03:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 12:03:25 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000001c0)={{0x2, 0x4e22, @rand_addr=0x1ff}, {0x306, @local}, 0x7f, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x29}}, 'vlan0\x00'}) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x3, 0x10000) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000180)) r2 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) ioctl(r2, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:03:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cheiksum'}]}) 12:03:25 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x4c00}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1527.206110][ T7096] encrypted_key: master key parameter is missing [ 1527.232136][ T7098] encrypted_key: master key parameter is missing 12:03:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") fdatasync(r0) [ 1527.369433][ T2480] print_req_error: I/O error, dev loop0, sector 0 flags 801 12:03:25 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x200200, 0x0) accept4$rose(r0, &(0x7f00000000c0)=@full={0xb, @dev, @remote, 0x0, [@rose, @remote, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000100)=0x40, 0x800) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r1, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:03:27 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) 12:03:27 executing program 5: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000380)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x400452c9, &(0x7f0000000100)) 12:03:27 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x6800}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_chelksum'}]}) 12:03:27 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000080)={0x8, 0x0, 0x10000, 0x5}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000000c0)={0xfffffffffffffffb, r1, 0xfffe, 0x7ff}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000500)={0x0, @remote, @initdev}, &(0x7f0000000540)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000580)={@remote, 0x2f, r3}) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000240)={0x80, 0x7, 0xc3e1, 0x10000, 0x2, 0x3}) r4 = dup3(r0, r0, 0x80000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000300)={0x6, 0x118, 0xfa00, {{0x3ff, 0x7, "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", 0xbc, 0x2, 0x6, 0x7, 0xff, 0x200, 0x2, 0x1}, r5}}, 0x120) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") fsetxattr$security_ima(r4, &(0x7f0000000440)='security.ima\x00', &(0x7f0000000480)=@v1={0x2, "6f22d989"}, 0x5, 0x2) memfd_create(&(0x7f0000000200)='\x00', 0x0) connect$inet6(r4, &(0x7f00000004c0)={0xa, 0x4e21, 0x8, @remote, 0x3}, 0x1c) socket$inet6(0xa, 0x80000, 0x7) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f00000001c0)={0xa3, &(0x7f0000000100)=""/163}) 12:03:27 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x80045006, &(0x7f00000004c0)) [ 1530.065121][ T7123] EXT4-fs: 4 callbacks suppressed [ 1530.065133][ T7123] EXT4-fs (sda1): Unrecognized mount option "journal_chelksum" or missing value 12:03:28 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYPTR64], 0x186) accept4$bt_l2cap(r0, &(0x7f0000000100), &(0x7f0000000140)=0xe, 0x800) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f00000000c0)={0x1, 0x0, [{0xffffffff, 0x0, 0x0, 0x0, @msi={0x1, 0x20, 0x9}}]}) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000180)) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64MMAP\x00', &(0x7f0000000080)='/dev/dsp\x00', 0x9, 0x3) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) 12:03:28 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000004500), 0x3fffe65, 0x0) [ 1530.193175][ T7121] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, [ 1530.235986][ T7139] EXT4-fs (sda1): Unrecognized mount option "journal_chelksum" or missing value 12:03:28 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x6c00}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cheoksum'}]}) [ 1530.518684][ T7153] EXT4-fs (sda1): Unrecognized mount option "journal_cheoksum" or missing value [ 1530.600448][ T7150] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, 12:03:28 executing program 5: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x6800}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:28 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0xa4800, 0x0) connect$pptp(r0, &(0x7f0000000340)={0x18, 0x2, {0x0, @remote}}, 0x1e) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r1, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x7, 0x8000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}}}, &(0x7f00000001c0)=0xe8) sendmsg$can_bcm(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="0700000002000000ff07000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="0100002001000000020000405d815f"], 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) [ 1530.647659][ T7159] EXT4-fs (sda1): Unrecognized mount option "journal_cheoksum" or missing value 12:03:28 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x7400}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_chepksum'}]}) [ 1530.838666][ T7163] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, 12:03:28 executing program 5: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x4c00}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:28 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0x1b, &(0x7f0000000000)="5d9146e03ef9c247076054") [ 1530.961567][ T7172] EXT4-fs (sda1): Unrecognized mount option "journal_chepksum" or missing value [ 1531.045950][ T7169] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, 12:03:28 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x80045007, &(0x7f00000004c0)) [ 1531.105786][ T7178] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, 12:03:29 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="5db34ae03ef902b0786e54") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x5, 0x400) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000240)={&(0x7f0000000280), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="5800ee00", @ANYRES16=r2, @ANYRESDEC=r2], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x0) syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x5, 0x2000) 12:03:31 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:lvm_control_t:s0\x00', 0x23, 0x3) 12:03:31 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x7a00}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_chesksum'}]}) 12:03:31 executing program 5: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x4800}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:31 executing program 0: syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x7, 0x101000) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) 12:03:31 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x8004500b, &(0x7f00000004c0)) 12:03:31 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x4, 0x40000000000000) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x400, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$PPPIOCSMAXCID(r1, 0x40047451, &(0x7f0000000240)=0x4) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000200)='veth1_to_bridge\x00') alarm(0x4) r2 = socket(0xb, 0x800, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') getsockopt$inet_dccp_buf(r2, 0x21, 0xd, &(0x7f0000000340)=""/232, &(0x7f0000000100)=0xe8) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="5000000041027da50a1992f767e93c96dc9cd4ba279c237b3b50ec9073b81348c94c24cb54fe98aea230addcb43327323abc514927a297d8b906888013de87fa6809c6d1dd048a8e0e7b63cbd46d56befc583b55f96f4dce936eebcac0a8b2e728f819eb338aea65ed", @ANYRES16=r3, @ANYBLOB="220025bd7000fbdbdf25090000003c00200008000200aa5900000c000400ffffffff00c68b64bb50b01e98c51c6f397bb78bea0000000c00040005000000000000000c00030000000000000000000c00040035f3000000000000"], 0x50}, 0x1, 0x0, 0x0, 0xc0}, 0x8040) 12:03:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_cheuksum'}]}) 12:03:31 executing program 5: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x4800}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:31 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0xc000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:31 executing program 0: setxattr$trusted_overlay_redirect(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='trusted.overlay.redirect\x00', &(0x7f0000000680)='./file0\x00', 0x8, 0x3) r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) fstat(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)={&(0x7f00000006c0)='./file0/file0\x00', 0x0, 0x8}, 0x10) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000580)={{}, {0x1, 0x4}, [{0x2, 0x1, r1}, {0x2, 0x1, r2}, {0x2, 0x3, r3}, {0x2, 0x4, r4}], {0x4, 0x2}, [{0x8, 0x2, r5}, {0x8, 0x0, r6}, {0x8, 0x1, r7}], {0x10, 0x1}, {0x20, 0x5}}, 0x5c, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:03:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_chexksum'}]}) 12:03:34 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) r1 = getpid() fcntl$setownex(r0, 0xf, &(0x7f0000000180)={0x3, r1}) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000040)=""/182) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000140)={0x0, r2}) 12:03:34 executing program 5: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x3f00}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:34 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x40000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:34 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0xade, 0x1) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0xf14, 0x2000) write$FUSE_LSEEK(r1, &(0x7f00000000c0)={0x18, 0xffffffffffffffda, 0x6, {0x9}}, 0x18) fcntl$getown(r0, 0x9) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:03:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_chec\nsum'}]}) 12:03:34 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x8004500f, &(0x7f00000004c0)) [ 1536.394304][ T7245] EXT4-fs: 11 callbacks suppressed [ 1536.394318][ T7245] EXT4-fs (sda1): Unrecognized mount option "journal_chec [ 1536.394318][ T7245] sum" or missing value 12:03:34 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000140)) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x0, 0x40000) bind$unix(r1, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) [ 1536.462196][ T7256] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, [ 1536.520780][ T7260] EXT4-fs (sda1): Unrecognized mount option "journal_chec [ 1536.520780][ T7260] sum" or missing value 12:03:34 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x80000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1536.611868][ T7252] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, 12:03:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_chec%sum'}]}) 12:03:34 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0xc919114393d385a1) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x178, r2, 0x704, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x48, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x88ec}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffffffe}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_BEARER={0x7c, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffff7}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xffffffffffff64a9}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x3, @loopback, 0x4}}}}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_BEARER={0x60, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'irlan0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x82af}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4000000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}]}, 0x178}}, 0xc800) 12:03:34 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x3, 0x103081) r1 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x0) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000040)=0xff, &(0x7f0000000100)=0x4) ioctl(r0, 0x7f, &(0x7f00000000c0)="5d9146e03ef9c237076054") [ 1536.809372][ T7270] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, [ 1536.831926][ T7273] EXT4-fs (sda1): Unrecognized mount option "journal_chec%sum" or missing value 12:03:34 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x100000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1536.947879][ T7278] EXT4-fs (sda1): Unrecognized mount option "journal_chec%sum" or missing value [ 1537.085700][ T7284] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, 12:03:37 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x10000) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @local}]}) 12:03:37 executing program 5: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x190f}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_check\num'}]}) 12:03:37 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000300)="5d9146b83500002107605461e768846ecd3beeb20855ec4251dda8d70f5150a678328ab06110b105c3eb3af178a3538fe7e3ded346cb92c4a67e47dfaa7bcbebb3b6adf3089f736a460d8439236e16f380e9d8d0b31e8c41e9e6552dcebb6eeab9693eb449e1aedaa8713505aa91c63048568c9b5a26da2a206326e47a2d1503d3c8f0c390938863966c4fcb1e82d23e4fadc2b8cb2c326f8d641d78bcc2973d016fff44827cf16ccd2289946fcd69e6d11f08ae4cf921d724b5470c0238bc3e205770d1908f7f79cf0b29131c") 12:03:37 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x3ff7f8}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:37 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x80045010, &(0x7f00000004c0)) [ 1539.526439][ T7298] EXT4-fs (sda1): Unrecognized mount option "journal_check [ 1539.526439][ T7298] um" or missing value [ 1539.627582][ T7305] EXT4-fs (sda1): Unrecognized mount option "ø" or missing value 12:03:37 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x3ff800}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_check#um'}]}) 12:03:37 executing program 5: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x190f}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:37 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x400000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_check%um'}]}) 12:03:38 executing program 5: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x3ff800}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:40 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000002, 0x1013, r0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) 12:03:40 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0xf83f00}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_check*um'}]}) [ 1542.561795][ T7342] EXT4-fs: 10 callbacks suppressed [ 1542.561807][ T7342] EXT4-fs (sda1): Unrecognized mount option "journal_check*um" or missing value [ 1542.651563][ T7345] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, 12:03:47 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x80045017, &(0x7f00000004c0)) 12:03:47 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) 12:03:47 executing program 5: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x400000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:47 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x1000000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:47 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) ioctl$TCSBRK(r0, 0x5409, 0x7) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) 12:03:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_check+um'}]}) [ 1549.288646][ T7361] EXT4-fs (sda1): Unrecognized mount option "journal_check+um" or missing value [ 1549.382200][ T7359] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, [ 1549.403601][ T7364] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, 12:03:47 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x2000000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1549.503088][ T7375] EXT4-fs (sda1): Unrecognized mount option "journal_check+um" or missing value 12:03:47 executing program 5: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x1000000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_check-um'}]}) 12:03:47 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ubi_ctrl\x00', 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e20, 0x7, @empty, 0x682}}, 0x8, 0x8000}, &(0x7f0000000180)=0x90) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x101040, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000000, 0x13, r0, 0x0) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000001c0)={r2, 0x4c5d}, 0x8) [ 1549.637607][ T7379] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, [ 1549.730123][ T7385] EXT4-fs (sda1): Unrecognized mount option "journal_check-um" or missing value 12:03:47 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x3000000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1549.813131][ T7382] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, [ 1549.858611][ T7395] EXT4-fs (sda1): Unrecognized mount option "journal_check-um" or missing value 12:03:47 executing program 0: syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) [ 1549.949841][ T7394] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, 12:03:48 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5011, &(0x7f00000004c0)) 12:03:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_check.um'}]}) 12:03:48 executing program 5: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x2000000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:48 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x4000000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:48 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x7, 0x400000) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000011c0)={0x4, [0x0, 0xed1b, 0x7, 0xc6ec]}, 0xc) sendmsg$unix(r1, &(0x7f0000001180)={&(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000001140)=[{&(0x7f0000000140)="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", 0x1000}], 0x1, 0x0, 0x0, 0x840}, 0x8080) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") [ 1550.427648][ T7410] EXT4-fs (sda1): Unrecognized mount option "journal_check.um" or missing value 12:03:50 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x5000000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:50 executing program 5: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x2000000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_check0um'}]}) 12:03:50 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) 12:03:50 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0xffffffffffffffff) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x400, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f00000000c0)) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000040)) 12:03:50 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:03:50 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000080)={0x3, 0x62, 0x240000000000000, 0x2, 0x3, 0xff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x4440, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000100)) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f00000001c0)={0x3db, 0x3, 0x7c7, 0xed34}, 0x10) 12:03:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_checkXum'}]}) 12:03:50 executing program 5: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x2000000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:50 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x6000000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_checkcum'}]}) 12:03:50 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x82000, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f00000000c0)={0x0, 0x24, "bf958d6bf37d4be679d755a783da0704faab56fdc1b0dcde48dcb983de9abe0cc955fd5a"}, &(0x7f0000000100)=0x2c) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000140)={r2, 0x9, 0x2}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0)={0xffffffffffffffff}, 0xab63cd704dc63f67, 0xd}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000240)={0x1, 0x10, 0xfa00, {&(0x7f0000000180), r3}}, 0x18) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:03:50 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x7000000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:50 executing program 5: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x100000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_checkdum'}]}) 12:03:51 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) 12:03:53 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x8010500c, &(0x7f00000004c0)) 12:03:53 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000080)={0x40, 0x3, 0x1}, 0x10) 12:03:53 executing program 5: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x100000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:53 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x9000000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:53 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[], 0x0) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) 12:03:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_checkium'}]}) [ 1555.401737][ T7498] EXT4-fs: 13 callbacks suppressed [ 1555.401748][ T7498] EXT4-fs (sda1): Unrecognized mount option "journal_checkium" or missing value 12:03:53 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) 12:03:53 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0xfffffffffffffffe) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f00000000c0)=0xffffffffffffffc0, 0x4) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={0x0, 0x3}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000180)={r2, 0x0, 0x1f, 0x7}, 0x10) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000001c0)={0x101, 0x0, 0x3, 0x4}) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000200)={0x0, r3}) [ 1555.540749][ T7501] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, [ 1555.569767][ T7500] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, 12:03:53 executing program 5: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x900}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_checklum'}]}) 12:03:53 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x10000000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1555.815070][ T7521] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, [ 1555.830291][ T7522] EXT4-fs (sda1): Unrecognized mount option "journal_checklum" or missing value 12:03:53 executing program 5: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x9000000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1556.104539][ T7536] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, 12:03:54 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x8010500d, &(0x7f00000004c0)) 12:03:54 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x8, 0x210000) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000000100)=0x8) prctl$PR_GET_SECCOMP(0x15) ioctl(r0, 0x2, &(0x7f0000000080)="5d9146e03ef9c237076054") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2, 0x0) 12:03:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_checkoum'}]}) 12:03:54 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x190f0000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:54 executing program 5: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x600}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1556.545277][ T7547] EXT4-fs (sda1): Unrecognized mount option "journal_checkoum" or missing value 12:03:54 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") r1 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000080), &(0x7f00000000c0)=0x40) [ 1556.608884][ T7541] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, [ 1556.636305][ T7545] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, 12:03:56 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) 12:03:56 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x1f000000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_checkpum'}]}) 12:03:56 executing program 5: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x190f0000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:56 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f00000000c0)="5d9146c43ff9c237076054") 12:03:56 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045003, &(0x7f00000004c0)) [ 1558.607168][ T7570] EXT4-fs (sda1): Unrecognized mount option "journal_checkpum" or missing value 12:03:56 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0xed, 0x100) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x100000000, 0x7f, 0x5, 0x2, 0x0, 0x5, 0x2, 0xfffffffffffffef1, 0x0, 0x3}, 0xb) 12:03:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_checkuum'}]}) 12:03:56 executing program 5: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xf5ffffff00000000}}]}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:56 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x20000000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:56 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x101004) ioctl(r0, 0x8, &(0x7f0000000000)="5d9146e03ef9c237076054") r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) socket$caif_stream(0x25, 0x1, 0x0) ioctl$PPPIOCGDEBUG(r1, 0x80047441, &(0x7f0000000140)) 12:03:57 executing program 5 (fault-call:1 fault-nth:0): r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000000180)={0x3, @null}) 12:03:59 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) 12:03:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_checkxum'}]}) 12:03:59 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x2d000000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:59 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000000180)={0x3, @null}) 12:03:59 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xfffffffffffffffd, 0x0) ioctl(r0, 0x21, &(0x7f0000000000)="5d9154ccd4000000000000") 12:03:59 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045004, &(0x7f00000004c0)) 12:03:59 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x2, &(0x7f0000000180)={0x3, @null}) [ 1561.670918][ T7614] EXT4-fs: 6 callbacks suppressed [ 1561.670929][ T7614] EXT4-fs (sda1): Unrecognized mount option "journal_checkxum" or missing value 12:03:59 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r1 = getpid() r2 = dup(r0) mlockall(0x7) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffff9c, 0x50, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r1, r2, 0x0, 0x1f, &(0x7f0000000080)='selinuxposix_acl_access^\x94]ppp1\x00', r3}, 0x30) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f00000001c0), 0x4) socket$rxrpc(0x21, 0x2, 0xa) [ 1561.758275][ T7611] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, [ 1561.780782][ T7623] EXT4-fs (sda1): Unrecognized mount option "journal_checkxum" or missing value 12:03:59 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x3f000000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:03:59 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x5411, &(0x7f0000000180)={0x3, @null}) 12:03:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_checks\nm'}]}) 12:03:59 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x541b, &(0x7f0000000180)={0x3, @null}) [ 1562.004458][ T7632] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, [ 1562.035157][ T7635] EXT4-fs (sda1): Unrecognized mount option "journal_checks [ 1562.035157][ T7635] m" or missing value [ 1562.188031][ T7643] EXT4-fs (sda1): Unrecognized mount option "journal_checks [ 1562.188031][ T7643] m" or missing value 12:04:02 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x40000000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:04:02 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x5421, &(0x7f0000000180)={0x3, @null}) 12:04:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_checks#m'}]}) 12:04:02 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000000040)={0x7b, 0x0, [0x5, 0x5, 0x10001, 0x1f]}) 12:04:02 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xef12, &(0x7f0000000100)="076054f02e09231b081a46883cd2fe01806b1aa1a1edf1ac157c9b89f12daf5bd9d09aee18ad80068b588d3860a0ea7958c34482107d266a0319bef5674631081148ad55813f1a66562e609e65c5966992ea478266e24ce516719dadc8a9f02fe8f0fdd0ceacd248858f1e6d8d476c8cb8655d8309efca918f87d202ded9609e36d9bf3c1e1d4dc8e917a17ae0640c16d71aa5f03d6dfd56") r1 = open(&(0x7f0000000000)='./file0\x00', 0x111200, 0x180) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) ioctl$sock_ifreq(r1, 0x8948, &(0x7f00000000c0)={'team0\x00', @ifru_addrs=@xdp={0x2c, 0x4, r2, 0x2a}}) 12:04:02 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045005, &(0x7f00000004c0)) 12:04:02 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x5450, &(0x7f0000000180)={0x3, @null}) [ 1564.735373][ T7653] EXT4-fs (sda1): Unrecognized mount option "journal_checks#m" or missing value 12:04:02 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) syz_mount_image$nfs(&(0x7f00000000c0)='nfs\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x3, &(0x7f0000000340)=[{&(0x7f0000000140)="4fc137696accd018ba5b56678ca040c2656b1fc23d000f051a0fe52a7edc5fc078627ab61e9fef4a73bff49660835f86d8f7af8ef62b76ad5afb25f72954cf282e8c188233a7ffe2bfdddc63c1d58ab8948803bd09fe40e2cf0345a01234877746624ee7b02b56afa73573774e11a05af81b04f24fb5b0871a7a8974e4b75c49ae5288ee8e122619c2974857b42839feeae789b77aae07fd02c9d366e0d299ee2e739ad82429e601d3941408aa409603249c644f1ee73a12a4c7b98d7db6ce1fba0aad9a3d5f41d7a1b66b1bfa65bd0e00d2e2f5b18982cf1fba35ab89d8df6a", 0xe0, 0x100000000}, {&(0x7f0000000240)="351fd147c6d81660065079f36de2a6e115b6dc18f8fc8405d4c1288638f165b1d0e5ef8f344352f0347daefd995cc135f8e885d4e85472325618e41fa2e095fdb08355c12a7d6ec5b553f00fcfd3ed4c28a2be54260544e1cf6af8a0457d2df0064315253277eb3049d3a0be06a500632af87d05aec636ce11238caf36ad9cbba09d33b8bfb58e029eef86485115d0076a79f687cb380b5e12d9f9", 0x9b, 0x5}, {&(0x7f0000000300)="dff623d2c3a0dcb3275353a98fabaddecbbd96751e155c853780249f36e6f3c6a4358da4e273be", 0x27, 0xffffffff00000000}], 0x40000, &(0x7f00000003c0)='/dev/dri/card#\x00') ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000080)={0x30000000, 0x1, 0x1e}) r1 = syz_open_dev$cec(&(0x7f0000000400)='/dev/cec#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@empty}}, &(0x7f00000005c0)=0xe8) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@can={0x1d, 0x0}, &(0x7f0000000900)=0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000940)={{{@in=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f0000000a40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000004780)={{{@in6=@ipv4={[], [], @multicast2}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000004880)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000048c0)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@loopback}}, &(0x7f00000049c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000004a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004a40)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000004a80)={0x11, 0x0, 0x0}, &(0x7f0000004ac0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004b00)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000004c00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000004c40)={@multicast1, @rand_addr, 0x0}, &(0x7f0000004c80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004cc0)={{{@in6=@ipv4={[], [], @empty}, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000004dc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000005200)={@multicast1, @dev, 0x0}, &(0x7f0000005240)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000005280)={{{@in6=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000005380)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005440)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1b, &(0x7f0000005480)={@remote, 0x0}, &(0x7f00000054c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000055c0)={@rand_addr, @local, 0x0}, &(0x7f0000005600)=0xc) getsockname(0xffffffffffffff9c, &(0x7f0000005b80)=@hci={0x1f, 0x0}, &(0x7f0000005c00)=0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000005c40)={{{@in=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000005d40)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000005d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000005dc0)=0x14, 0x800) accept(0xffffffffffffffff, &(0x7f0000005e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000005e80)=0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000f280)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f000000f380)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000f440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000f480)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f000000f4c0)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@initdev}}, &(0x7f000000f5c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f600)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f000000f700)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f000000f740)={@loopback, @empty, 0x0}, &(0x7f000000f780)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1d, &(0x7f000000f7c0)={@local, 0x0}, &(0x7f000000f800)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000f840)={{{@in=@multicast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f000000f940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000010f40)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000011040)=0xe8) recvmmsg(0xffffffffffffff9c, &(0x7f0000013200)=[{{&(0x7f0000011080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x80, &(0x7f0000011380)=[{&(0x7f0000011100)=""/64, 0x40}, {&(0x7f0000011140)=""/185, 0xb9}, {&(0x7f0000011200)=""/112, 0x70}, {&(0x7f0000011280)=""/237, 0xed}], 0x4, &(0x7f00000113c0)=""/147, 0x93}, 0x3}, {{&(0x7f0000011480)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000011700)=[{&(0x7f0000011500)=""/195, 0xc3}, {&(0x7f0000011600)=""/252, 0xfc}], 0x2, &(0x7f0000011740)=""/186, 0xba}, 0x2e9}, {{&(0x7f0000011800)=@ax25={{0x3, @netrom}, [@rose, @bcast, @default, @remote, @bcast, @rose, @netrom, @null]}, 0x80, &(0x7f0000011e80)=[{&(0x7f0000011880)=""/144, 0x90}, {&(0x7f0000011940)=""/155, 0x9b}, {&(0x7f0000011a00)=""/227, 0xe3}, {&(0x7f0000011b00)=""/144, 0x90}, {&(0x7f0000011bc0)=""/8, 0x8}, {&(0x7f0000011c00)=""/204, 0xcc}, {&(0x7f0000011d00)=""/40, 0x28}, {&(0x7f0000011d40)=""/184, 0xb8}, {&(0x7f0000011e00)=""/114, 0x72}], 0x9}, 0x3}, {{0x0, 0x0, &(0x7f0000012380)=[{&(0x7f0000011f40)=""/121, 0x79}, {&(0x7f0000011fc0)=""/118, 0x76}, {&(0x7f0000012040)=""/152, 0x98}, {&(0x7f0000012100)=""/100, 0x64}, {&(0x7f0000012180)=""/32, 0x20}, {&(0x7f00000121c0)=""/142, 0x8e}, {&(0x7f0000012280)=""/83, 0x53}, {&(0x7f0000012300)=""/75, 0x4b}], 0x8, &(0x7f0000012400)=""/124, 0x7c}, 0x5a}, {{&(0x7f0000012480)=@tipc=@name, 0x80, &(0x7f0000012940)=[{&(0x7f0000012500)=""/226, 0xe2}, {&(0x7f0000012600)=""/208, 0xd0}, {&(0x7f0000012700)=""/16, 0x10}, {&(0x7f0000012740)=""/42, 0x2a}, {&(0x7f0000012780)=""/85, 0x55}, {&(0x7f0000012800)=""/61, 0x3d}, {&(0x7f0000012840)=""/246, 0xf6}], 0x7, &(0x7f00000129c0)=""/142, 0x8e}, 0x55f10cd3}, {{&(0x7f0000012a80)=@x25={0x9, @remote}, 0x80, &(0x7f0000012ec0)=[{&(0x7f0000012b00)=""/174, 0xae}, {&(0x7f0000012bc0)=""/11, 0xb}, {&(0x7f0000012c00)=""/250, 0xfa}, {&(0x7f0000012d00)=""/107, 0x6b}, {&(0x7f0000012d80)=""/66, 0x42}, {&(0x7f0000012e00)=""/61, 0x3d}, {&(0x7f0000012e40)=""/120, 0x78}], 0x7, &(0x7f0000012f40)=""/14, 0xe}, 0x9}, {{0x0, 0x0, &(0x7f0000013180)=[{&(0x7f0000012f80)=""/236, 0xec}, {&(0x7f0000013080)=""/234, 0xea}], 0x2, &(0x7f00000131c0)=""/25, 0x19}, 0x7f}], 0x7, 0x2040, &(0x7f00000133c0)={0x77359400}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000013dc0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000013d80)={&(0x7f0000000a80)=ANY=[@ANYBLOB='t\t\x00\x00', @ANYRES16=r2, @ANYBLOB="000129bd7000fcdbdf250100000008000100", @ANYRES32=r3, @ANYBLOB="300102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r4, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB="080007000000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004003f00000008000600", @ANYRES32=r6, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000500000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400feffffff08000100", @ANYRES32=r7, @ANYBLOB="700202003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000040000100240001006d6f646500000000000000000000000000000000000000000000000000000000080003000500000010000400726f756e64726f62696e000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000500000008000600", @ANYRES32=r8, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040007000000080007000000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000300000008000600", @ANYRES32=r10, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400fffffeff40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040002000000080007000000000040000100240001006c625f706f72745f737461747300d975c4300000000000000000000000000000080003000b000000080004006e7d000008000600035aee2cae321bddaecd7f4492e1ee9e2ad1b2407451c4e3ce66d257764ff513ced0afd8ac3af23f27c4ff9d34eb0595cdf3be16c3f485463ba3c3a92dbe176819e95bd0ceb21df34df5f7935ab504ec8fbdde3a20d798f4ae7646755970c288bf03780c", @ANYRES32=r11, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r12, @ANYBLOB="08000100", @ANYRES32=r13, @ANYBLOB="1c02020040000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000001000040062726f6164636173740000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r14, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004008e04000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004001f0000003c000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000000c00040072616e646f6d0000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000800000008000600", @ANYRES32=r15, @ANYBLOB="3c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c00040068617368000000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r16, @ANYBLOB="3c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000008000100", @ANYRES32=r17, @ANYBLOB="b801020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000000000008000600", @ANYRES32=r18, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r19, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b000000080004000800000008000700000000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r20, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r21, @ANYBLOB="08000700000000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r22, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e63650008000100", @ANYRES32=r23, @ANYBLOB="380102003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r24, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r25, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32=r26, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000000000008000600", @ANYRES32=r27, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000300000008000600", @ANYRES32=r28, @ANYBLOB="08000100", @ANYRES32=r29, @ANYBLOB="8400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000000008008000600", @ANYRES32=r30, @ANYBLOB="40000100240001006d6f646500000000000000000000000000000000000000000000000000000000080003000500000010000400726f756e64726f62696e0000"], 0x974}}, 0x80) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") [ 1564.818843][ T7654] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, [ 1564.850319][ T7666] EXT4-fs (sda1): Unrecognized mount option "journal_checks#m" or missing value 12:04:02 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x5451, &(0x7f0000000180)={0x3, @null}) 12:04:02 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x48000000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:04:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_checks%m'}]}) 12:04:02 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x5452, &(0x7f0000000180)={0x3, @null}) [ 1565.082081][ T7675] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, 12:04:03 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x5460, &(0x7f0000000180)={0x3, @null}) 12:04:03 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x4c000000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:04:03 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x8901, &(0x7f0000000180)={0x3, @null}) 12:04:05 executing program 4: r0 = semget(0x2, 0x2, 0x200) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f00000000c0)=""/92) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x195000, 0x0) mkdirat$cgroup(r1, &(0x7f0000000180)='syz1\x00', 0x1ff) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r2, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r2, 0x0) ioctl$int_in(r2, 0x800c5012, &(0x7f00000004c0)) getsockopt$inet_int(r2, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) 12:04:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v1={0x1000000, [{0xce2, 0x7f}]}, 0xc, 0x3) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000080)={{0x0, @loopback, 0x4e20, 0x4, 'lblc\x00', 0x31, 0x3ff, 0x8}, {@remote, 0x4e21, 0x0, 0x177a, 0x3, 0x9}}, 0x44) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x3, 0x0) ioctl(r1, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:04:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_checks*m'}]}) 12:04:05 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x8902, &(0x7f0000000180)={0x3, @null}) 12:04:05 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x68000000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:04:05 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045006, &(0x7f00000004c0)) 12:04:05 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x8903, &(0x7f0000000180)={0x3, @null}) [ 1567.829289][ T7702] EXT4-fs: 3 callbacks suppressed [ 1567.829301][ T7702] EXT4-fs (sda1): Unrecognized mount option "journal_checks*m" or missing value [ 1567.852789][ T7713] IPVS: set_ctl: invalid protocol: 0 127.0.0.1:20000 [ 1567.877743][ T7717] IPVS: set_ctl: invalid protocol: 0 127.0.0.1:20000 12:04:05 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x8904, &(0x7f0000000180)={0x3, @null}) [ 1567.908527][ T7715] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, 12:04:05 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000080)={0x0, 0x0, 0x10001, 0x80}) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:04:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_checks+m'}]}) 12:04:05 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x6c000000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:04:05 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x8906, &(0x7f0000000180)={0x3, @null}) [ 1568.110609][ T7728] EXT4-fs (sda1): Unrecognized mount option "journal_checks+m" or missing value [ 1568.221460][ T7731] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, [ 1568.274962][ T7737] EXT4-fs (sda1): Unrecognized mount option "journal_checks+m" or missing value 12:04:08 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f00000001c0)="5d9146e03ef9c237076054") r1 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x9, 0x200) write$P9_RLERRORu(r1, &(0x7f0000000180)={0x17, 0x7, 0x2, {{0xa, '/dev/cec#\x00'}, 0x800}}, 0x17) fcntl$setpipe(r0, 0x407, 0x80000001) r2 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x1, 0x2) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x8) 12:04:08 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x8907, &(0x7f0000000180)={0x3, @null}) 12:04:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_checks-m'}]}) 12:04:08 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x74000000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:04:08 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) tee(r0, r0, 0x0, 0x1) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) 12:04:08 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045007, &(0x7f00000004c0)) 12:04:08 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x890b, &(0x7f0000000180)={0x3, @null}) [ 1570.914409][ T7746] EXT4-fs (sda1): Unrecognized mount option "journal_checks-m" or missing value 12:04:08 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x890c, &(0x7f0000000180)={0x3, @null}) [ 1570.984640][ T7756] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, [ 1571.022343][ T7761] EXT4-fs (sda1): Unrecognized mount option "journal_checks-m" or missing value 12:04:09 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x7a000000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:04:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_checks.m'}]}) 12:04:09 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0x3, &(0x7f0000000080)="5d9146e03ef9c237076054") ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 12:04:09 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x8915, &(0x7f0000000180)={0x3, @null}) [ 1571.233970][ T7772] EXT4-fs (sda1): Unrecognized mount option "journal_checks.m" or missing value 12:04:09 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x7, 0x400000) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1f, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f00000000c0)={0x5, 0x526, 0x8, 0x10001, 0x6, 0x8}) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000040)="5d9146e03ef9c237076054") 12:04:09 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x891e, &(0x7f0000000180)={0x3, @null}) [ 1571.308604][ T7768] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, 12:04:09 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0x8cffffff}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:04:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_checks0m'}]}) 12:04:11 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$btrfs(&(0x7f0000000180)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="ac47ad206f8bc31a8374b63958016fd949b1bc7d3d489e7483dd1c9da84d2a1c79dab18fd1c16f11dd2acee17288d5ee9e907f0fca3cb6fc0355f67180f899e6a04197434c6332d24324b66ac221ecaf9aea95eab63a6c6d2d490a8b7ed246efc496c5c0cc3cd01fe7e1152fcad3c46d0b37601ac72e4c919dca2d459dc4bebea7263d0df2fe10e5b7eb3ed44b3c5f787a063a2feb0a07e05d738268e5401bf15d0e401d8e1947ce7659aa97426b38146856226d6fa9e2eef139612e63c8be53e009d2ac8b9ec1f35e046b27d4b502cc4f8ca968e546ee46ca289265c4e2e7", 0xdf, 0x1}], 0x110000, &(0x7f0000000500)={[{@nossd_spread='nossd_spread'}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}, {@compress='compress'}, {@space_cache_v1='space_cache=v1'}, {@user_subvol_rm='user_subvol_rm_allowed'}], [{@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'vboxnet0^'}}, {@fsmagic={'fsmagic', 0x3d, 0x1}}, {@smackfsdef={'smackfsdef', 0x3d, 'bdev,posix_acl_accessusertrustedeth0'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@permit_directio='permit_directio'}, {@obj_role={'obj_role', 0x3d, '/dev/kvm\x00'}}, {@subj_user={'subj_user', 0x3d, '/dev/dsp\x00'}}]}) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000100)={0x0, 0x2}) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0xffffffaa) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x80000, 0x0) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbfe, 0xc204148}, 0xc) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) 12:04:11 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xf15, 0xc4000) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000000c0)=""/45, &(0x7f0000000140)=0x2d) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000180)={0x0, r1, 0x2, 0x5, 0x8000, 0x100}) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000100)=0x1) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x400, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000300)=0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000980)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x5000}, 0xc, &(0x7f0000000940)={&(0x7f0000000340)={0x5f8, 0x1, 0xf, 0x100, 0x70bd2d, 0x25dfdbfe, {0xa, 0x0, 0x8}, [@nested={0xac, 0x48, [@generic="53ae0dbb3d32b6004b79559d499c43166eb824191e5e0ffb0173", @typed={0x14, 0x83, @ipv6=@mcast2}, @typed={0x4, 0x1c}, @generic="d05936293e3541abd0b2a207c91cba554df4026399b20ccf9a3bfda095d2c5fb9b7b15cc9cad", @generic="00cadf8be4d3db6d3eaa", @typed={0x44, 0x34, @binary="1873e5512a755696d79a7b72a67c373942eb1cd27d943df7fa29620fe0cef668283a5ea9ccd52ec82646f1ae076c207caeab7118a77919add81a59014dd91f"}]}, @generic="5e64776736c85897df019a554ed508514cb01231ea0561ef793a8e2dcf313fc86cba1f896b2aebce63030fbfc5b1cf1abf17b0bd5432c7b8ca51efa69887d405c1016c199a02d8d28d74369465e891f7c28ad66a6d1752be987a577f16cbb403a2b8d8d7267157fd0968db41", @typed={0x34, 0x5d, @str='mime_typevboxnet0*em1+posix_acl_accessGPLppp0\\\x00'}, @nested={0xc, 0x4, [@typed={0x8, 0x34, @uid=r2}]}, @generic="1e7cf222645a8b5b4976e52e5a5645f8cc5b30a9825247098d9d0b6691dc3157bd66b0138aa546453bf73afa5d31b624ee7a1aac3e6968bf1117f7f95ff4a6d7946665644c7f57b2f8dafb67b7c6852a546671bab85ed8455262a56131864dcf36a9970c5ddf0cb0725bedb93e6d95c58b596fcf471004b10b413b1d538ad82be7c8f3b0fcd45f9f048d7a672a98bae97b0a465bb8595b6fd50201390f4a35994cde8baf80654b071ce6d5e15c41745bf34ad7cf6883c9cb1fbc707d27e2b317507f5891a4d4a5fbd2dcb9c7231311641e91e0aa8d6225e338256d69736a76af26b0a6dbec261e781f30", @nested={0x10c, 0x3e, [@generic="93fc4206bdd13180dfe8c4c1f9c65711b87cb9820652416ddd5efc57b3f19f460b4da08fc9eefd0b2b5b45427b471f98de3f24c3dcc0c806708cff1181c62dad1062f54c88ef5f9450d6fb49b4e73b0afd91d612927475c0428452086f64175fe296ccb668a562470b1b39dd2576234a48460ca1bdd416d877448c406ea6d951b32da99430a55a3f1359c9506af8a91fe58001aa6457b234a50015901af6ed83670b240929129bb1626395b81f76115ba949f4182ea56dafac0083a7e4475f67e65d6bbcdd32a9f2878ddd5038bee2be57f9efedb045939dd2a1bca9436008d8b4bb988e88e1e22bc12273c4a86358b3158ad1ac426f34", @typed={0x8, 0x93, @ipv4=@rand_addr=0x85}, @typed={0x8, 0x88, @pid=r3}]}, @typed={0x8, 0x6c, @ipv4=@remote}, @generic="0e4ebc5f2787003ca31b23ebf6128b5ab9440683fb57f965c56e25300f77358d0f5e067be25ae195c70883cf037586255caf32ff9f6779ca4405505fdfbf77756dcaef72a8587bfb10", @nested={0x244, 0x3, [@generic="5272339a066d95def5a0cb14ed1e8daa67a4f1625c7e2e8d73768fd4616830fc78fa0958fe89c80b657add9a4ea07b42078cc1f098c606c9d44f707d4e57ad0bee5649b4f33ce556978f05c35410d9414b24fb4ac76e7de1fdad9848c393c999340c413a1ebe859b946ca518bfa7dc4236ffb9219ccca6cc68cf7c02bec789178b0bbb8da4cdb8c1547133e4fa81b83ce16575a2f07db4e5756026a91d4aab0b8390369d738b3ad80fa0daed9bcb91c9b3212b16d18c41b9ba6ad77073a0984cf569b00e91d312a6b96647df637ea32b267dc5fb335853b54ccc732156997825609f67f889", @typed={0x18, 0x82, @str='/dev/snd/pcmC#D#c\x00'}, @typed={0x18, 0x3f, @str='ppp0^mime_typewlan0\x00'}, @generic="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", @typed={0x10, 0x1, @str='#f]\'+ppp1\x00'}, @generic="20fa22db4f34d88fca7dc674d15310bfdef800858f81", @typed={0x8, 0x64, @fd=r0}]}]}, 0x5f8}, 0x1, 0x0, 0x0, 0x80}, 0x20000080) 12:04:11 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x8940, &(0x7f0000000180)={0x3, @null}) 12:04:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_checksXm'}]}) 12:04:11 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0xc0000000}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:04:11 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045009, &(0x7f00000004c0)) 12:04:11 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x8941, &(0x7f0000000180)={0x3, @null}) [ 1573.967085][ T7799] EXT4-fs: 4 callbacks suppressed [ 1573.967097][ T7799] EXT4-fs (sda1): Unrecognized mount option "journal_checksXm" or missing value [ 1574.046436][ T7803] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, 12:04:11 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x894c, &(0x7f0000000180)={0x3, @null}) 12:04:12 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x28000, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) 12:04:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_checkscm'}]}) 12:04:12 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0xf5ffffff}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:04:12 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x8980, &(0x7f0000000180)={0x3, @null}) [ 1574.250293][ T7824] EXT4-fs (sda1): Unrecognized mount option "journal_checkscm" or missing value [ 1574.338783][ T7831] EXT4-fs (sda1): Unrecognized mount option "journal_checkscm" or missing value [ 1574.428922][ T7830] EXT4-fs (sda1): Unrecognized mount option "ÿ" or missing value 12:04:20 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000040)={0x80000000, 0x1f, 0x2, 0x6}) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) accept4$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000280)=0xe8) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)=@expire={0x100, 0x18, 0x320, 0x70bd26, 0x25dfdbff, {{{@in6=@rand_addr="f7db3737e5465609a73f585b31a6d260", @in=@empty, 0x4e23, 0x5, 0x4e22, 0x1, 0xa, 0x80, 0xa0, 0x32, r1, r2}, {@in=@dev={0xac, 0x14, 0x14, 0x1e}, 0x4d3, 0x33}, @in6=@empty, {0x80000001, 0x3, 0x2b, 0x0, 0x81, 0x101, 0x8, 0x9}, {0x9, 0x4, 0x0, 0x7fff}, {0xcb, 0x0, 0x5}, 0x70bd28, 0x3501, 0x2, 0x3, 0x1d4, 0x1}, 0x75ad}, [@replay_thresh={0x8, 0xb, 0x800}]}, 0x100}, 0x1, 0x0, 0x0, 0x800}, 0x4000) 12:04:20 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='NET_DM\x00') r1 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0xaba4, 0x8000) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0xff, @empty, 0x7}}, 0x0, 0x9a2, 0x0, "dbe7601784fa668cf7aca0b575b4c57cb23235f2468d1c0f4333f56c8cba2aea656fb46a439a1c3f3e59b02f1c6ab9d3661cbb2a68d83d1187057799f68c0210d2ea53c2e8fc95ecc30484772a369af1"}, 0xd8) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") open(&(0x7f0000000080)='./file0\x00', 0x400080, 0x114) set_mempolicy(0x8000, &(0x7f0000000240)=0x10001, 0x4) 12:04:20 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x8981, &(0x7f0000000180)={0x3, @null}) 12:04:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_checksdm'}]}) 12:04:20 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0xf6ffffff}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:04:20 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc004500a, &(0x7f00000004c0)) 12:04:21 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x8982, &(0x7f0000000180)={0x3, @null}) [ 1583.082956][ T7847] EXT4-fs (sda1): Unrecognized mount option "journal_checksdm" or missing value [ 1583.156253][ T7846] EXT4-fs (sda1): Unrecognized mount option "ÿ" or missing value 12:04:21 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x8983, &(0x7f0000000180)={0x3, @null}) [ 1583.216111][ T7861] EXT4-fs (sda1): Unrecognized mount option "journal_checksdm" or missing value 12:04:21 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x10001, 0x4000020840) socket$vsock_stream(0x28, 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:04:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_checksim'}]}) 12:04:21 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0xf8f73f00}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:04:21 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x89a0, &(0x7f0000000180)={0x3, @null}) [ 1583.460721][ T7877] EXT4-fs (sda1): Unrecognized mount option "journal_checksim" or missing value [ 1583.560344][ T7874] EXT4-fs (sda1): re-mounted. Opts: inode_readahead_blks=0x0000000000000000, 12:04:23 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)=ANY=[@ANYBLOB="080000000000000002000000000000000200010000000000", @ANYRES32=r0, @ANYBLOB="00000000050000000000000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB="00000000060000000000000000000000000000000000000000000000"]) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000100)=0x7, 0x4) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x100, 0x0) 12:04:23 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x8000) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") 12:04:23 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x89a1, &(0x7f0000000180)={0x3, @null}) 12:04:23 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc004500b, &(0x7f00000004c0)) 12:04:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_checkslm'}]}) 12:04:23 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0xfcfdffff}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1586.134277][ T7889] EXT4-fs (sda1): Unrecognized mount option "journal_checkslm" or missing value 12:04:24 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x89e0, &(0x7f0000000180)={0x3, @null}) 12:04:24 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) accept(0xffffffffffffff9c, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, &(0x7f0000000100)=0x80) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") [ 1586.283663][ T7895] EXT4-fs (sda1): Unrecognized mount option "ÿ" or missing value [ 1586.355921][ T7902] EXT4-fs (sda1): Unrecognized mount option "journal_checkslm" or missing value 12:04:24 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x89e2, &(0x7f0000000180)={0x3, @null}) 12:04:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_checksom'}]}) 12:04:24 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0xfdfdffff}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:04:24 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x89e3, &(0x7f0000000180)={0x3, @null}) [ 1586.541821][ T7917] EXT4-fs (sda1): Unrecognized mount option "journal_checksom" or missing value [ 1586.626738][ T7920] EXT4-fs (sda1): Unrecognized mount option "ÿ" or missing value 12:04:27 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYBLOB="b68b4fa6819f3523a06a4f21a528c8dda90b88b93c828267c52c250460b93b21597fee208fdcb4269092f2658411061fa3c81dc67e45f43593f723360836ed7c1fb31ea6a7fc858f0efaea610edbe404706a28b36a4f146fb5dff9b490cf7b1347fb70addd214f18a6373a913abd69", @ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYBLOB="b6dc58cc81b32434de4c78a22289cb2ddae4aa9c0b696945336edbdfcaaee73a90191ac311911aa4bda77e9f5d6d7cf0e459c5a62641a300aac94febf88b012cf00875c90c31f7d3141b61fc41bc347e3051873326c98c975817ef076c9b876ff1ae6aeaa36f41c3f68245a9ebd91554c174f893abbdc1e674ff76912e892dc429aa87e6ff74e6b22fa3a6ec758cd36bad1bbf7def73d3fc8f066ecba87f8e995f27edb4254a94d0c1ded0bf91379239ae70a2511a719b81751312fd4aa417166308305abe6a84cd88897221193debfb29deb75834a1cd71b249dfbb2cdd7d571a86fa", @ANYRESOCT=r0, @ANYRES64=r0, @ANYPTR64=&(0x7f0000000080)=ANY=[@ANYRESOCT=r0, @ANYRESHEX=r0, @ANYPTR], @ANYRES64=r0, @ANYRES32=r0], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES64=r0, @ANYRESDEC=r0, @ANYRESOCT=r0, @ANYRESHEX, @ANYPTR, @ANYRESOCT, @ANYPTR64, @ANYPTR=&(0x7f0000000200)=ANY=[@ANYRES16=r0, @ANYRES16=r0, @ANYPTR, @ANYRES64=r0], @ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRESOCT=r0, @ANYRES64=r0, @ANYPTR, @ANYRES32=r0], @ANYRES32=r0], @ANYRESDEC=0x0, @ANYPTR], 0xfffffffffffffd2e) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000340)={&(0x7f0000000040)=[0xfffffffeffffffff, 0xffffffff80000001], 0x2, 0xfffffffffffffe00, 0x5, 0x80000000, 0x7, 0x400, {0x0, 0x1f, 0x100000000, 0x10001, 0x568, 0x8001, 0xe082, 0xffffffff80000000, 0x1, 0x1ec7, 0x100, 0x0, 0x101, 0x8, "c7624c9c855ad096dde069d52e61ad7db27abbf04a122a4a93bbecde87c99b5f"}}) 12:04:27 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x89e7, &(0x7f0000000180)={0x3, @null}) 12:04:27 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x4, 0x8000) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f00000000c0)=0x8000000) 12:04:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_checkspm'}]}) 12:04:27 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0xfffffdfc}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:04:27 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045010, &(0x7f00000004c0)) [ 1589.206865][ T7933] EXT4-fs: 1 callbacks suppressed [ 1589.206877][ T7933] EXT4-fs (sda1): Unrecognized mount option "journal_checkspm" or missing value 12:04:27 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x89e8, &(0x7f0000000180)={0x3, @null}) 12:04:27 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000002, 0x910, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r1, 0x300, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffff801}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x20000004) 12:04:27 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x9, 0x4080) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") [ 1589.345913][ T7936] EXT4-fs (sda1): Unrecognized mount option "ü" or missing value 12:04:27 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x89e9, &(0x7f0000000180)={0x3, @null}) [ 1589.403924][ T7949] EXT4-fs (sda1): Unrecognized mount option "journal_checkspm" or missing value 12:04:27 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0xfffffdfd}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:04:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_checkssm'}]}) [ 1589.500720][ T7959] syz-executor5 uses old SIOCAX25GETINFO 12:04:27 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x89ea, &(0x7f0000000180)={0x3, @null}) 12:04:27 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000000)="5d9146e03ef9c237076054") r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x1, @local, 0x7f}}, 0x4, 0x1000, 0x1, 0x9, 0xfc}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000180)={r2, @in6={{0xa, 0x4e21, 0x2, @rand_addr="6e7daf021a14657ee1c21abdbdbe283b", 0x5}}}, &(0x7f0000000240)=0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000280)=[@in6={0xa, 0x4e24, 0x5, @remote, 0x19c4}, @in6={0xa, 0x4e21, 0xbc4a, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @empty}, @in6={0xa, 0x4e21, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8000}, @in={0x2, 0x4e22, @broadcast}], 0x84) [ 1589.637135][ T7962] EXT4-fs (sda1): Unrecognized mount option "ý" or missing value 12:04:27 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x89eb, &(0x7f0000000180)={0x3, @null}) [ 1589.703529][ T7965] EXT4-fs (sda1): Unrecognized mount option "journal_checkssm" or missing value [ 1589.839805][ T7979] EXT4-fs (sda1): Unrecognized mount option "journal_checkssm" or missing value 12:04:27 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x89ed, &(0x7f0000000180)={0x3, @null}) 12:04:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_checksxm'}]}) [ 1590.071625][ T7984] EXT4-fs (sda1): Unrecognized mount option "journal_checksxm" or missing value [ 1590.179707][ T7986] EXT4-fs (sda1): Unrecognized mount option "journal_checksxm" or missing value 12:04:28 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045011, &(0x7f00000004c0)) 12:04:28 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0xffffff8c}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1590.379522][ T7989] EXT4-fs (sda1): Unrecognized mount option "Œ" or missing value 12:04:28 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) prctl$PR_GET_TSC(0x19, &(0x7f0000000200)) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800c5012, &(0x7f00000004c0)) 12:04:28 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffff7ffbd, &(0x7f0000000840)="5d9146e03ef9c237076054c96a198999cfb78e62c4c9ffd0ec9f9d88ea76af28b638a97c2b869835ad483d842f5be16e7274415f242804ef8333f58dd4f4bba628b950b2ccb20a05cbcc5c8967d0a8c95ce3740922c3") r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e23, 0x1, @ipv4={[], [], @empty}, 0x8}}, [0x386, 0x0, 0x400, 0x1f, 0x8, 0x1, 0x0, 0x9, 0x9, 0x9, 0x2cd79d5f, 0x4, 0x6, 0x7f, 0x6]}, &(0x7f0000000500)=0x100) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000540)={r2, 0x7}, &(0x7f0000000700)=0xfffffffffffffeb1) ioctl$sock_x25_SIOCADDRT(r1, 0x890b, &(0x7f0000000740)={@remote={[], 0x3}, 0x6, 'vxcan1\x00'}) sendmsg$inet_sctp(r1, &(0x7f0000000680)={&(0x7f00000000c0)=@in={0x2, 0x4e23, @remote}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="1e52f832eb6be3800a6610afdaa35c6ecf6808fe49deca432575e6380b260cc48c124c9fe1358464d1ba7841b70f4541b5c2fa9ce5d0e7beb5fc547666ea2a45a6f3cb57e0359a752c039823ca8d41236616a3e331757fcd469b70275036cc00f21ea75a36cdc874945410a775c95cc72881e195698f34c0b420bf0899e7e37e60bdfa12c49f45066c70b801f5d116ddfe6cc312a798471c1f253d1f575d732e2dc62f7827fd8f6789ffd2f5715af0ebbb4b33e3bd1d104b12914e626c5bd6269c6edc0f5fe12ae046d5bcc0d9f34a8d8cd1df11d084560fe5790f2189f8f4f87709ca944fdfdbd871d7934e1ffa6547", 0xf0}, {&(0x7f0000000200)="1c89db590c492ee3f633d8c5535f96e6d6f56b0b1337676a686515fe5a5a7db623f21df2307c23d50f02637086f29489b4fc23dbda2bbab3523a583821a5340cf2b12bc9bfb92c45e826c76ed0f2b1140ba814ad9e07110ac63d23f112834bd2e7924666388150e836ec5351352c90e6", 0x70}, {&(0x7f0000000280)="784e4db4399b26719dbc22490bd37f", 0xf}, {&(0x7f00000002c0)="e4963d290a194d10491c2b44889e844e53c75f3d7155eb448c8f8dd10c5fe4e9860b40deb7228a8ccb6c", 0x2a}, {&(0x7f0000000300)="c2adad9b00e757dd141b9c69fb42d15636222f0dec", 0x15}, {&(0x7f0000000340)="fa29c29d344a084517b575dfb352f73363b7", 0x12}], 0x6, &(0x7f00000005c0)=[@dstaddrv6={0x20, 0x84, 0x8, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @authinfo={0x18, 0x84, 0x6, {0x8}}, @sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x85, 0x9, r2}}, @dstaddrv4={0x18, 0x84, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}, @sndinfo={0x20, 0x84, 0x2, {0x4, 0x200, 0x6, 0x2, r3}}, @dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0x7ff}], 0xa8, 0x800}, 0x6c928c9bf075252f) fchmodat(r1, &(0x7f0000000000)='./file0\x00', 0x4) 12:04:28 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x40049409, &(0x7f0000000180)={0x3, @null}) 12:04:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_checksu\n'}]}) 12:04:28 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0xfffffff5}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) [ 1590.556782][ T8000] EXT4-fs (sda1): Unrecognized mount option "journal_checksu [ 1590.556782][ T8000] " or missing value 12:04:28 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x4020940d, &(0x7f0000000180)={0x3, @null}) 12:04:28 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0xc0045878, &(0x7f0000000180)={0x3, @null}) 12:04:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000140)={[{@journal_checksum='journal_checksu%'}]}) 12:04:28 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0xc0045878, &(0x7f0000000180)={0x3, @null}) 12:04:28 executing program 1: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{}, 'syz0\x00'}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks'}}], [], 0xfffffff6}) r1 = semget(0x3, 0x0, 0x102) semctl$SETVAL(r1, 0x7, 0x10, &(0x7f0000000040)=0x401) 12:04:29 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0xc0045014, &(0x7f00000004c0)) 12:04:29 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0xc0189436, &(0x7f0000000180)={0x3, @null}) 12:04:31 executing program 4: r0 = syz_open_dev$midi(&(0x7f0000000680)='/dev/midi#\x00', 0x4, 0x40) getsockname$inet6(r0, &(0x7f00000006c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000700)=0x1c) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0)={r1, 0x7f, 0x0, 0x10000, 0x5, 0x3}, 0x14) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r2, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r2, 0x0) ioctl$int_in(r2, 0x800c5012, &(0x7f00000004c0)) [ 1605.319762][ T3866] udevd invoked oom-killer: gfp_mask=0x6200ca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=-1000 [ 1605.342068][ T3866] CPU: 1 PID: 3866 Comm: udevd Not tainted 5.0.0-rc2-next-20190118 #15 [ 1605.350349][ T3866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1605.360402][ T3866] Call Trace: [ 1605.363702][ T3866] dump_stack+0x1db/0x2d0 [ 1605.368047][ T3866] ? dump_stack_print_info.cold+0x20/0x20 [ 1605.373849][ T3866] dump_header+0x1e6/0x11a6 [ 1605.378377][ T3866] ? add_lock_to_list.isra.0+0x450/0x450 [ 1605.384012][ T3866] ? mark_held_locks+0x100/0x100 [ 1605.388960][ T3866] ? print_usage_bug+0xd0/0xd0 [ 1605.393724][ T3866] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 1605.399354][ T3866] ? ___ratelimit+0x37c/0x686 [ 1605.404045][ T3866] ? mark_held_locks+0xb1/0x100 [ 1605.408898][ T3866] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1605.414707][ T3866] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1605.420513][ T3866] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1605.425797][ T3866] ? trace_hardirqs_on+0xbd/0x310 [ 1605.430821][ T3866] ? kasan_check_read+0x11/0x20 [ 1605.435670][ T3866] ? ___ratelimit+0x37c/0x686 [ 1605.440345][ T3866] ? trace_hardirqs_off_caller+0x300/0x300 [ 1605.446148][ T3866] ? do_raw_spin_trylock+0x270/0x270 [ 1605.451450][ T3866] ? trace_hardirqs_on_caller+0x310/0x310 [ 1605.457165][ T3866] ? lock_acquire+0x1db/0x570 [ 1605.461849][ T3866] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1605.467658][ T3866] ? ___ratelimit+0xac/0x686 [ 1605.472253][ T3866] ? idr_get_free+0xee0/0xee0 [ 1605.476930][ T3866] ? kasan_check_read+0x11/0x20 [ 1605.481777][ T3866] ? do_raw_spin_unlock+0xa0/0x330 [ 1605.486889][ T3866] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1605.492875][ T3866] oom_kill_process.cold+0x10/0x9ca [ 1605.498075][ T3866] ? _raw_spin_unlock+0x2d/0x50 [ 1605.502930][ T3866] ? oom_badness+0xca/0xa50 [ 1605.507436][ T3866] ? out_of_memory+0xc8f/0x1420 [ 1605.512287][ T3866] ? find_held_lock+0x35/0x120 [ 1605.517059][ T3866] ? oom_evaluate_task+0x540/0x540 [ 1605.522174][ T3866] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1605.528418][ T3866] ? lock_downgrade+0xbe0/0xbe0 [ 1605.533265][ T3866] ? kasan_check_read+0x11/0x20 [ 1605.538117][ T3866] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1605.544097][ T3866] ? rcu_read_unlock_special+0x380/0x380 [ 1605.549735][ T3866] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1605.555976][ T3866] ? oom_evaluate_task+0x305/0x540 [ 1605.561092][ T3866] out_of_memory+0x885/0x1420 [ 1605.565779][ T3866] ? oom_killer_disable+0x340/0x340 [ 1605.570981][ T3866] ? mutex_trylock+0x248/0x2d0 [ 1605.575749][ T3866] ? __ww_mutex_check_waiters+0x160/0x160 [ 1605.581484][ T3866] __alloc_pages_slowpath+0x21c9/0x2c50 [ 1605.587068][ T3866] ? warn_alloc+0x110/0x110 [ 1605.591580][ T3866] ? add_lock_to_list.isra.0+0x450/0x450 [ 1605.597210][ T3866] ? add_lock_to_list.isra.0+0x450/0x450 [ 1605.602852][ T3866] ? check_preemption_disabled+0x48/0x290 [ 1605.608579][ T3866] ? add_lock_to_list.isra.0+0x450/0x450 [ 1605.614241][ T3866] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1605.620070][ T3866] ? ___might_sleep+0x1e7/0x310 [ 1605.624922][ T3866] ? arch_local_save_flags+0x50/0x50 [ 1605.630206][ T3866] ? lock_release+0xc40/0xc40 [ 1605.634885][ T3866] ? lock_downgrade+0xbe0/0xbe0 [ 1605.639730][ T3866] ? kasan_check_read+0x11/0x20 [ 1605.644596][ T3866] __alloc_pages_nodemask+0xa37/0xdc0 [ 1605.649976][ T3866] ? __alloc_pages_slowpath+0x2c50/0x2c50 [ 1605.655697][ T3866] ? __put_page+0x190/0x190 [ 1605.660300][ T3866] ? blk_finish_plug+0x8f/0xa2 [ 1605.665071][ T3866] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1605.671316][ T3866] alloc_pages_current+0x107/0x210 [ 1605.676428][ T3866] __page_cache_alloc+0x3cd/0x620 [ 1605.681448][ T3866] ? read_cache_pages+0xa90/0xa90 [ 1605.686471][ T3866] ? __filemap_set_wb_err+0x3f0/0x3f0 [ 1605.691897][ T3866] ? __page_cache_alloc+0x19c/0x620 [ 1605.697095][ T3866] ? find_held_lock+0x60/0x120 [ 1605.701864][ T3866] pagecache_get_page+0x36f/0x1070 [ 1605.706978][ T3866] ? find_lock_entry+0x8b0/0x8b0 [ 1605.711928][ T3866] ? __do_page_cache_readahead+0x64b/0x800 [ 1605.717745][ T3866] ? read_pages+0x650/0x650 [ 1605.722243][ T3866] ? kasan_check_write+0x14/0x20 [ 1605.727176][ T3866] ? lock_downgrade+0xbe0/0xbe0 [ 1605.732034][ T3866] ? kasan_check_read+0x11/0x20 [ 1605.736883][ T3866] ? up_read_non_owner+0x100/0x100 [ 1605.741995][ T3866] ? rcu_read_unlock_special+0x380/0x380 [ 1605.747634][ T3866] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1605.753882][ T3866] filemap_fault+0xb6a/0x2a30 [ 1605.758571][ T3866] ? grab_cache_page_write_begin+0xb0/0xb0 [ 1605.764381][ T3866] ? __lock_is_held+0xb6/0x140 [ 1605.769151][ T3866] ? lock_acquire+0x1db/0x570 [ 1605.773889][ T3866] ? ext4_filemap_fault+0x7b/0xaf [ 1605.778919][ T3866] ? lock_release+0xc40/0xc40 [ 1605.783600][ T3866] ? print_usage_bug+0xd0/0xd0 [ 1605.788371][ T3866] ? down_read+0x8d/0x120 [ 1605.792696][ T3866] ? ext4_filemap_fault+0x7b/0xaf [ 1605.797719][ T3866] ? __down_interruptible+0x740/0x740 [ 1605.803088][ T3866] ? __lock_acquire+0x572/0x4a10 [ 1605.808041][ T3866] ? find_held_lock+0x35/0x120 [ 1605.812811][ T3866] ext4_filemap_fault+0x83/0xaf [ 1605.817671][ T3866] __do_fault+0x176/0x7b0 [ 1605.822009][ T3866] ? mark_held_locks+0x100/0x100 [ 1605.826985][ T3866] ? do_page_mkwrite+0x740/0x740 [ 1605.831915][ T3866] ? pmd_val+0x85/0x100 [ 1605.836164][ T3866] ? add_mm_counter_fast.part.0+0x40/0x40 [ 1605.841879][ T3866] ? pmd_val+0x85/0x100 [ 1605.846043][ T3866] ? add_mm_counter_fast.part.0+0x40/0x40 [ 1605.851780][ T3866] ? compat_get_fd_set+0x80/0x80 [ 1605.856720][ T3866] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1605.862963][ T3866] __handle_mm_fault+0x377c/0x5610 [ 1605.868080][ T3866] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1605.873625][ T3866] ? check_preemption_disabled+0x48/0x290 [ 1605.879345][ T3866] ? handle_mm_fault+0x3cc/0xc80 [ 1605.884294][ T3866] ? lock_downgrade+0xbe0/0xbe0 [ 1605.889140][ T3866] ? kasan_check_read+0x11/0x20 [ 1605.893990][ T3866] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1605.899980][ T3866] ? rcu_read_unlock_special+0x380/0x380 [ 1605.905609][ T3866] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1605.911848][ T3866] ? check_preemption_disabled+0x48/0x290 [ 1605.917577][ T3866] handle_mm_fault+0x4ec/0xc80 [ 1605.922345][ T3866] ? __handle_mm_fault+0x5610/0x5610 [ 1605.927643][ T3866] __do_page_fault+0x5ef/0xda0 [ 1605.932409][ T3866] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1605.938486][ T3866] do_page_fault+0xe6/0x7d8 [ 1605.942985][ T3866] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1605.948619][ T3866] ? vmalloc_sync_all+0x30/0x30 [ 1605.953468][ T3866] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1605.959621][ T3866] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1605.965254][ T3866] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1605.971494][ T3866] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1605.977205][ T3866] ? page_fault+0x8/0x30 [ 1605.981450][ T3866] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1605.986990][ T3866] ? page_fault+0x8/0x30 [ 1605.991237][ T3866] page_fault+0x1e/0x30 [ 1605.995385][ T3866] RIP: 0033:0x4044ad [ 1605.999285][ T3866] Code: Bad RIP value. [ 1606.003343][ T3866] RSP: 002b:00007ffc608691c0 EFLAGS: 00010207 [ 1606.009404][ T3866] RAX: 0000000000000001 RBX: 0000000000000bb8 RCX: 00007f32cd448943 [ 1606.017370][ T3866] RDX: 0000000000000008 RSI: 00007ffc608692b0 RDI: 000000000000000a [ 1606.025332][ T3866] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000001 [ 1606.033295][ T3866] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000003 [ 1606.041257][ T3866] R13: 0000000000000000 R14: 00000000025891e0 R15: 0000000002587250 [ 1606.055856][ T3866] Mem-Info: [ 1606.059021][ T3866] active_anon:108297 inactive_anon:189 isolated_anon:83 [ 1606.059021][ T3866] active_file:5 inactive_file:15 isolated_file:0 [ 1606.059021][ T3866] unevictable:0 dirty:0 writeback:0 unstable:0 [ 1606.059021][ T3866] slab_reclaimable:15327 slab_unreclaimable:104839 [ 1606.059021][ T3866] mapped:52230 shmem:246 pagetables:1634 bounce:0 [ 1606.059021][ T3866] free:24974 free_pcp:0 free_cma:0 [ 1606.105505][ T3866] Node 0 active_anon:433184kB inactive_anon:756kB active_file:4kB inactive_file:0kB unevictable:0kB isolated(anon):332kB isolated(file):0kB mapped:208904kB dirty:0kB writeback:0kB shmem:984kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 118784kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 1606.171431][ T3866] Node 1 active_anon:4kB inactive_anon:0kB active_file:0kB inactive_file:4kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? yes [ 1606.281327][ T3866] Node 0 DMA free:10352kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1606.392084][ T3866] lowmem_reserve[]: 0 2535 2537 2537 [ 1606.420004][ T3866] Node 0 DMA32 free:35964kB min:36080kB low:45100kB high:54120kB active_anon:433184kB inactive_anon:756kB active_file:4kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2599668kB mlocked:0kB kernel_stack:7648kB pagetables:6536kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1606.534397][ T3866] lowmem_reserve[]: 0 0 2 2 [ 1606.538943][ T3866] Node 0 Normal free:28kB min:28kB low:32kB high:36kB active_anon:0kB inactive_anon:0kB active_file:8kB inactive_file:4kB unevictable:0kB writepending:0kB present:786432kB managed:2204kB mlocked:0kB kernel_stack:96kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1606.682637][ T3866] lowmem_reserve[]: 0 0 0 0 [ 1606.687241][ T3866] Node 1 Normal free:53544kB min:53780kB low:67224kB high:80668kB active_anon:4kB inactive_anon:0kB active_file:0kB inactive_file:4kB unevictable:0kB writepending:0kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1606.812770][ T3866] lowmem_reserve[]: 0 0 0 0 [ 1606.817322][ T3866] Node 0 DMA: 0*4kB 0*8kB 1*16kB (U) 1*32kB (U) 1*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 1*2048kB (M) 2*4096kB (M) = 10352kB [ 1606.888592][ T3866] Node 0 DMA32: 1818*4kB (UME) 1128*8kB (UME) 620*16kB (ME) 231*32kB (UME) 31*64kB (M) 1*128kB (U) 0*256kB 1*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 36232kB [ 1606.945594][ T3866] Node 0 Normal: 3*4kB (U) 1*8kB (U) 1*16kB (U) 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 36kB [ 1607.004648][ T3866] Node 1 Normal: 4*4kB (ME) 1*8kB (M) 3*16kB (UME) 3*32kB (ME) 4*64kB (UME) 3*128kB (ME) 4*256kB (UME) 1*512kB (M) 2*1024kB (M) 2*2048kB (UE) 11*4096kB (M) = 53544kB [ 1607.062498][ T3866] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1607.093211][ T3866] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1607.102507][ T3866] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1607.180280][ T3866] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1607.210186][ T3866] 248 total pagecache pages [ 1607.229678][ T3866] 0 pages in swap cache [ 1607.247492][ T3866] Swap cache stats: add 0, delete 0, find 0/0 [ 1607.265868][ T3866] Free swap = 0kB [ 1607.269589][ T3866] Total swap = 0kB [ 1607.297153][ T3866] 1965979 pages RAM [ 1607.300969][ T3866] 0 pages HighMem/MovableOnly [ 1607.343479][ T3866] 343988 pages reserved [ 1607.347647][ T3866] 0 pages cma reserved [ 1607.351709][ T3866] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0-1,global_oom,task_memcg=/syz5,task=syz-executor5,pid=2617,uid=0 [ 1607.431434][ T3866] Out of memory: Kill process 2617 (syz-executor5) score 1005 or sacrifice child [ 1607.462793][ T3866] Killed process 2617 (syz-executor5) total-vm:72844kB, anon-rss:6308kB, file-rss:34816kB, shmem-rss:0kB [ 1607.506815][ T1043] page:ffffea0001d1fc00 count:1 mapcount:1 mapping:ffff88809cfe8cb1 index:0xc4297f0 [ 1607.517819][ T1043] anon [ 1607.517829][ T1043] flags: 0x105e0000008003c(uptodate|dirty|lru|active|swapbacked) [ 1607.529529][ T1043] raw: 0105e0000008003c ffffea0001d1f4c8 ffffea0001d1fc48 ffff88809cfe8cb1 [ 1607.553824][ T1043] raw: 000000000c4297f0 0000000000000000 0000000100000000 ffff8880a9412ac0 [ 1607.573289][ T1043] page dumped because: VM_BUG_ON_PAGE(page_ref_count(page)) [ 1607.591550][ T1043] page->mem_cgroup:ffff8880a9412ac0 [ 1607.606318][ T1043] ------------[ cut here ]------------ [ 1607.611793][ T1043] kernel BUG at mm/internal.h:77! [ 1607.618712][ T1043] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1607.624763][ T1043] CPU: 0 PID: 1043 Comm: kcompactd0 Not tainted 5.0.0-rc2-next-20190118 #15 [ 1607.633408][ T1043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1607.643469][ T1043] RIP: 0010:split_page+0x423/0x500 [ 1607.648582][ T1043] Code: 4c 89 e7 e8 ef f1 10 00 0f 0b 48 c7 c6 80 68 52 88 4c 89 ff e8 de f1 10 00 0f 0b 48 c7 c6 00 69 52 88 4c 89 ff e8 cd f1 10 00 <0f> 0b 48 c7 c6 20 68 52 88 4c 89 e7 e8 bc f1 10 00 0f 0b 4c 89 ef [ 1607.668175][ T1043] RSP: 0000:ffff8880a7e3eda8 EFLAGS: 00010246 [ 1607.674214][ T1043] RAX: 0000000000000000 RBX: ffffea0001d1fc34 RCX: 0000000000000000 [ 1607.682157][ T1043] RDX: ffffed1014fc7d66 RSI: ffffffff81b480fe RDI: ffffed1014fc7da6 [ 1607.690105][ T1043] RBP: ffff8880a7e3eed8 R08: 0000000000000021 R09: 0000000000000000 [ 1607.698052][ T1043] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880a7e3ee20 [ 1607.705999][ T1043] R13: dffffc0000000000 R14: ffff8880a7e3eeb0 R15: ffffea0001d1fc00 [ 1607.713986][ T1043] FS: 0000000000000000(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 1607.722897][ T1043] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1607.729487][ T1043] CR2: 00007f32cd448943 CR3: 0000000009871000 CR4: 00000000001406f0 [ 1607.737457][ T1043] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1607.745422][ T1043] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1607.753390][ T1043] Call Trace: [ 1607.756681][ T1043] ? __build_all_zonelists+0x120/0x120 [ 1607.762143][ T1043] ? post_alloc_hook+0x21c/0x300 [ 1607.767084][ T1043] ? clear_zone_contiguous+0x50/0x50 [ 1607.772371][ T1043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1607.778610][ T1043] ? isolate_freepages_block+0x988/0x1110 [ 1607.784335][ T1043] split_map_pages+0x452/0x780 [ 1607.789115][ T1043] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1607.794923][ T1043] ? compact_unlock_should_abort.isra.0+0x220/0x220 [ 1607.801506][ T1043] ? compaction_alloc+0xd61/0x2970 [ 1607.806620][ T1043] ? trace_hardirqs_off_caller+0x300/0x300 [ 1607.812421][ T1043] ? do_raw_spin_trylock+0x270/0x270 [ 1607.817704][ T1043] ? zone_watermark_ok+0x1b0/0x1b0 [ 1607.822819][ T1043] compaction_alloc+0x1873/0x2970 [ 1607.827855][ T1043] ? isolate_freepages_block+0x1110/0x1110 [ 1607.833661][ T1043] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1607.839900][ T1043] ? kernel_poison_pages+0x17f/0x2c0 [ 1607.845186][ T1043] ? mark_free_pages+0x3c0/0x3c0 [ 1607.850123][ T1043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1607.856372][ T1043] ? PageHuge+0x178/0x2a0 [ 1607.860702][ T1043] ? hugetlb_vm_op_pagesize+0x130/0x130 [ 1607.866246][ T1043] ? __put_page+0x127/0x190 [ 1607.870747][ T1043] ? arch_local_save_flags+0x50/0x50 [ 1607.876044][ T1043] ? kasan_check_write+0x14/0x20 [ 1607.880991][ T1043] migrate_pages+0x48e/0x2cc0 [ 1607.885681][ T1043] ? kcompactd_cpu_online+0x1d0/0x1d0 [ 1607.891057][ T1043] ? isolate_freepages_block+0x1110/0x1110 [ 1607.896872][ T1043] ? buffer_migrate_page_norefs+0x40/0x40 [ 1607.902594][ T1043] ? mark_held_locks+0x100/0x100 [ 1607.907537][ T1043] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1607.913015][ T1043] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1607.918650][ T1043] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1607.924107][ T1043] ? lock_acquire+0x1db/0x570 [ 1607.928787][ T1043] ? lock_acquire+0x1db/0x570 [ 1607.933459][ T1043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1607.939692][ T1043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1607.945931][ T1043] ? check_preemption_disabled+0x48/0x290 [ 1607.951647][ T1043] ? pageblock_skip_persistent+0x1e6/0x340 [ 1607.957449][ T1043] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 1607.963691][ T1043] ? trace_event_raw_event_mm_compaction_suitable_template+0x3c0/0x3c0 [ 1607.971922][ T1043] ? rcu_pm_notify+0xd0/0xd0 [ 1607.976517][ T1043] compact_zone+0x2207/0x3e90 [ 1607.981214][ T1043] ? print_usage_bug+0xd0/0xd0 [ 1607.985983][ T1043] ? compaction_suitable+0x560/0x560 [ 1607.991263][ T1043] ? __free_page_list+0x1260/0x1260 [ 1607.996456][ T1043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1608.002692][ T1043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1608.008933][ T1043] ? check_preemption_disabled+0x48/0x290 [ 1608.010454][ T5935] syz-executor0 invoked oom-killer: gfp_mask=0x6200ca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=1000 [ 1608.014651][ T1043] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 1608.014665][ T1043] ? rcu_pm_notify+0xd0/0xd0 [ 1608.014684][ T1043] ? rcu_read_lock_sched_held+0x110/0x130 [ 1608.014703][ T1043] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1608.048594][ T1043] ? isolate_migratepages_range+0x280/0x280 [ 1608.054485][ T1043] ? defer_compaction+0x4d0/0x4d0 [ 1608.059518][ T1043] ? rcu_pm_notify+0xd0/0xd0 [ 1608.064129][ T1043] kcompactd_do_work+0x6de/0x1200 [ 1608.069155][ T1043] ? psi_memstall_enter+0x211/0x2b0 [ 1608.074356][ T1043] ? sysfs_compact_node+0x100/0x100 [ 1608.079557][ T1043] ? trace_hardirqs_on+0xbd/0x310 [ 1608.080188][ T5935] CPU: 1 PID: 5935 Comm: syz-executor0 Not tainted 5.0.0-rc2-next-20190118 #15 [ 1608.084589][ T1043] ? kasan_check_read+0x11/0x20 [ 1608.093494][ T5935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1608.098323][ T1043] ? trace_hardirqs_off_caller+0x300/0x300 [ 1608.108347][ T5935] Call Trace: [ 1608.114139][ T1043] ? _raw_spin_unlock_irq+0x5e/0x90 [ 1608.117401][ T5935] dump_stack+0x1db/0x2d0 [ 1608.122573][ T1043] ? psi_memstall_enter+0x242/0x2b0 [ 1608.126879][ T5935] ? dump_stack_print_info.cold+0x20/0x20 [ 1608.132070][ T1043] ? rcu_pm_notify+0xd0/0xd0 [ 1608.137753][ T5935] ? cpuset_nodemask_valid_mems_allowed+0x90/0x90 [ 1608.142317][ T1043] ? psi_memstall_tick+0x230/0x230 [ 1608.148703][ T5935] dump_header+0x1e6/0x11a6 [ 1608.153801][ T1043] ? __might_sleep+0x95/0x190 [ 1608.158275][ T5935] ? mark_held_locks+0x100/0x100 [ 1608.162929][ T1043] kcompactd+0x251/0x970 [ 1608.167847][ T5935] ? pagefault_out_of_memory+0x1a1/0x1a1 [ 1608.172071][ T1043] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1608.177683][ T5935] ? mark_held_locks+0x100/0x100 [ 1608.183461][ T1043] ? kcompactd_do_work+0x1200/0x1200 [ 1608.188373][ T5935] ? lock_acquire+0x1db/0x570 [ 1608.193633][ T1043] ? trace_hardirqs_on+0xbd/0x310 [ 1608.198301][ T5935] ? ___ratelimit+0x16e/0x686 [ 1608.203811][ T1043] ? __kthread_parkme+0xc3/0x1b0 [ 1608.208497][ T5935] ? trace_hardirqs_on+0xbd/0x310 [ 1608.213411][ T1043] ? finish_wait+0x490/0x490 [ 1608.218417][ T5935] ? kasan_check_read+0x11/0x20 [ 1608.222979][ T1043] ? schedule+0x108/0x350 [ 1608.227802][ T5935] ? ___ratelimit+0x37c/0x686 [ 1608.232108][ T1043] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1608.236757][ T5935] ? trace_hardirqs_off_caller+0x300/0x300 [ 1608.242553][ T1043] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1608.248343][ T5935] ? do_raw_spin_trylock+0x270/0x270 [ 1608.254571][ T1043] ? __kthread_parkme+0xfb/0x1b0 [ 1608.259848][ T5935] ? trace_hardirqs_on_caller+0x310/0x310 [ 1608.264762][ T1043] kthread+0x357/0x430 [ 1608.270456][ T5935] ? lock_acquire+0x1db/0x570 [ 1608.274516][ T1043] ? kcompactd_do_work+0x1200/0x1200 [ 1608.279172][ T5935] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1608.284425][ T1043] ? kthread_stop+0x920/0x920 [ 1608.290205][ T5935] ? ___ratelimit+0xac/0x686 [ 1608.294857][ T1043] ret_from_fork+0x3a/0x50 [ 1608.299424][ T5935] ? idr_get_free+0xee0/0xee0 [ 1608.303814][ T1043] Modules linked in: [ 1608.308475][ T5935] ? kasan_check_read+0x11/0x20 [ 1608.317175][ T5935] ? do_raw_spin_unlock+0xa0/0x330 [ 1608.317943][ T1043] ---[ end trace 590b5f766254f093 ]--- [ 1608.322291][ T5935] ? lock_release+0xc40/0xc40 [ 1608.327751][ T1043] RIP: 0010:split_page+0x423/0x500 [ 1608.332387][ T5935] oom_kill_process.cold+0x10/0x9ca [ 1608.337491][ T1043] Code: 4c 89 e7 e8 ef f1 10 00 0f 0b 48 c7 c6 80 68 52 88 4c 89 ff e8 de f1 10 00 0f 0b 48 c7 c6 00 69 52 88 4c 89 ff e8 cd f1 10 00 <0f> 0b 48 c7 c6 20 68 52 88 4c 89 e7 e8 bc f1 10 00 0f 0b 4c 89 ef [ 1608.342660][ T5935] ? _raw_spin_unlock+0x2d/0x50 [ 1608.362262][ T1043] RSP: 0000:ffff8880a7e3eda8 EFLAGS: 00010246 [ 1608.367073][ T5935] ? oom_badness+0xca/0xa50 [ 1608.367097][ T5935] ? __sanitizer_cov_trace_cmp2+0x10/0x20 [ 1608.373147][ T1043] RAX: 0000000000000000 RBX: ffffea0001d1fc34 RCX: 0000000000000000 [ 1608.377625][ T5935] ? oom_evaluate_task+0x540/0x540 [ 1608.383326][ T1043] RDX: ffffed1014fc7d66 RSI: ffffffff81b480fe RDI: ffffed1014fc7da6 [ 1608.391273][ T5935] ? mark_oom_victim+0x550/0x550 [ 1608.396374][ T1043] RBP: ffff8880a7e3eed8 R08: 0000000000000021 R09: 0000000000000000 [ 1608.404320][ T5935] ? lock_downgrade+0xbe0/0xbe0 [ 1608.404339][ T5935] ? lock_release+0xc40/0xc40 [ 1608.409251][ T1043] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880a7e3ee20 [ 1608.417210][ T5935] ? rcu_read_unlock_special+0x380/0x380 [ 1608.417233][ T5935] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1608.422059][ T1043] R13: dffffc0000000000 R14: ffff8880a7e3eeb0 R15: ffffea0001d1fc00 [ 1608.426715][ T5935] ? oom_evaluate_task+0x305/0x540 [ 1608.426737][ T5935] out_of_memory+0x885/0x1420 [ 1608.434713][ T1043] FS: 0000000000000000(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 1608.440320][ T5935] ? oom_killer_disable+0x340/0x340 [ 1608.446540][ T1043] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1608.454492][ T5935] ? mutex_trylock+0x248/0x2d0 [ 1608.454511][ T5935] ? __ww_mutex_check_waiters+0x160/0x160 [ 1608.459594][ T1043] CR2: 00007f32cd448943 CR3: 0000000097d7e000 CR4: 00000000001406f0 [ 1608.464251][ T5935] __alloc_pages_slowpath+0x21c9/0x2c50 [ 1608.464279][ T5935] ? warn_alloc+0x110/0x110 [ 1608.473187][ T1043] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1608.478355][ T5935] ? add_lock_to_list.isra.0+0x450/0x450 [ 1608.484924][ T1043] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1608.489671][ T5935] ? __lock_is_held+0xb6/0x140 [ 1608.495388][ T1043] Kernel panic - not syncing: Fatal exception [ 1608.503356][ T5935] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1608.551427][ T5935] ? page_to_nid.part.0+0x20/0x20 [ 1608.556446][ T5935] ? ___might_sleep+0x1e7/0x310 [ 1608.561288][ T5935] ? arch_local_save_flags+0x50/0x50 [ 1608.566568][ T5935] ? lock_release+0xc40/0xc40 [ 1608.571239][ T5935] ? lock_downgrade+0xbe0/0xbe0 [ 1608.576095][ T5935] __alloc_pages_nodemask+0xa37/0xdc0 [ 1608.581461][ T5935] ? __alloc_pages_slowpath+0x2c50/0x2c50 [ 1608.587182][ T5935] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1608.593417][ T5935] alloc_pages_current+0x107/0x210 [ 1608.598537][ T5935] __page_cache_alloc+0x3cd/0x620 [ 1608.603553][ T5935] ? alloc_pages_current+0x10f/0x210 [ 1608.608831][ T5935] ? __filemap_set_wb_err+0x3f0/0x3f0 [ 1608.614196][ T5935] ? __page_cache_alloc+0x19c/0x620 [ 1608.619381][ T5935] ? find_held_lock+0x60/0x120 [ 1608.624142][ T5935] pagecache_get_page+0x36f/0x1070 [ 1608.629248][ T5935] ? find_lock_entry+0x8b0/0x8b0 [ 1608.634181][ T5935] ? __do_page_cache_readahead+0x64b/0x800 [ 1608.639983][ T5935] ? read_pages+0x650/0x650 [ 1608.644474][ T5935] ? kasan_check_write+0x14/0x20 [ 1608.649400][ T5935] ? lock_downgrade+0xbe0/0xbe0 [ 1608.654247][ T5935] ? kasan_check_read+0x11/0x20 [ 1608.659087][ T5935] ? up_read_non_owner+0x100/0x100 [ 1608.664196][ T5935] ? rcu_read_unlock_special+0x380/0x380 [ 1608.669830][ T5935] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1608.676078][ T5935] filemap_fault+0xb6a/0x2a30 [ 1608.680757][ T5935] ? grab_cache_page_write_begin+0xb0/0xb0 [ 1608.686555][ T5935] ? __lock_is_held+0xb6/0x140 [ 1608.691326][ T5935] ? lock_acquire+0x1db/0x570 [ 1608.695993][ T5935] ? ext4_filemap_fault+0x7b/0xaf [ 1608.701008][ T5935] ? lock_release+0xc40/0xc40 [ 1608.705681][ T5935] ? print_usage_bug+0xd0/0xd0 [ 1608.710444][ T5935] ? down_read+0x8d/0x120 [ 1608.714763][ T5935] ? ext4_filemap_fault+0x7b/0xaf [ 1608.719778][ T5935] ? __down_interruptible+0x740/0x740 [ 1608.725140][ T5935] ? __lock_acquire+0x572/0x4a10 [ 1608.730071][ T5935] ? finish_task_switch+0x1e9/0xac0 [ 1608.735269][ T5935] ext4_filemap_fault+0x83/0xaf [ 1608.740124][ T5935] __do_fault+0x176/0x7b0 [ 1608.744449][ T5935] ? mark_held_locks+0x100/0x100 [ 1608.749379][ T5935] ? do_page_mkwrite+0x740/0x740 [ 1608.754309][ T5935] ? pmd_val+0x85/0x100 [ 1608.758457][ T5935] ? add_mm_counter_fast.part.0+0x40/0x40 [ 1608.764168][ T5935] ? pmd_val+0x85/0x100 [ 1608.768316][ T5935] ? add_mm_counter_fast.part.0+0x40/0x40 [ 1608.774036][ T5935] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1608.780272][ T5935] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1608.786511][ T5935] __handle_mm_fault+0x377c/0x5610 [ 1608.791616][ T5935] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1608.797159][ T5935] ? check_preemption_disabled+0x48/0x290 [ 1608.802871][ T5935] ? handle_mm_fault+0x3cc/0xc80 [ 1608.807810][ T5935] ? lock_downgrade+0xbe0/0xbe0 [ 1608.812650][ T5935] ? kasan_check_read+0x11/0x20 [ 1608.817495][ T5935] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1608.823477][ T5935] ? rcu_read_unlock_special+0x380/0x380 [ 1608.829105][ T5935] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1608.835347][ T5935] ? check_preemption_disabled+0x48/0x290 [ 1608.841072][ T5935] handle_mm_fault+0x4ec/0xc80 [ 1608.845834][ T5935] ? __handle_mm_fault+0x5610/0x5610 [ 1608.851121][ T5935] __do_page_fault+0x5ef/0xda0 [ 1608.855883][ T5935] do_page_fault+0xe6/0x7d8 [ 1608.860380][ T5935] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1608.866003][ T5935] ? vmalloc_sync_all+0x30/0x30 [ 1608.870857][ T5935] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1608.877005][ T5935] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1608.882732][ T5935] ? page_fault+0x8/0x30 [ 1608.886966][ T5935] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1608.892500][ T5935] ? page_fault+0x8/0x30 [ 1608.896739][ T5935] page_fault+0x1e/0x30 [ 1608.900886][ T5935] RIP: 0033:0x4015d4 [ 1608.904779][ T5935] Code: Bad RIP value. [ 1608.908831][ T5935] RSP: 002b:00007f12a6926690 EFLAGS: 00010286 [ 1608.914883][ T5935] RAX: 00000000bb2b89cc RBX: 000000000000000b RCX: 0000000000458099 [ 1608.922846][ T5935] RDX: 0000000000000000 RSI: 00007f12a69266c0 RDI: 000000000000000b [ 1608.930804][ T5935] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1608.938763][ T5935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1608.946726][ T5935] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1608.955788][ T1043] Kernel Offset: disabled [ 1608.960112][ T1043] Rebooting in 86400 seconds..