0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r5, 0xc008551c, &(0x7f00000000c0)={0x2, 0x18, [0x9b88, 0x38a7, 0x4, 0x3, 0xff, 0x2]}) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r6 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r0, r6, 0x0, 0x8000fffffffe) 16:05:30 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x40000}}], 0x8000238, 0x0, 0x0) 16:05:30 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x11) 16:05:31 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffff7f, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:05:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:05:31 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x400300}}], 0x8000238, 0x0, 0x0) 16:05:31 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x1c) 16:05:31 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r5, 0xc008551c, &(0x7f00000000c0)={0x2, 0x18, [0x9b88, 0x38a7, 0x4, 0x3, 0xff, 0x2]}) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8000fffffffe) 16:05:31 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xe0) 16:05:31 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0xa00100}}], 0x8000238, 0x0, 0x0) 16:05:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:05:31 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:05:31 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x1000000}}], 0x8000238, 0x0, 0x0) 16:05:31 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x1f4) 16:05:31 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r5, 0xc008551c, &(0x7f00000000c0)={0x2, 0x18, [0x9b88, 0x38a7, 0x4, 0x3, 0xff, 0x2]}) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8000fffffffe) 16:05:32 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:05:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 16:05:32 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x2000000}}], 0x8000238, 0x0, 0x0) 16:05:32 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x3e8) 16:05:32 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r5, 0xc008551c, &(0x7f00000000c0)={0x2, 0x18, [0x9b88, 0x38a7, 0x4, 0x3, 0xff, 0x2]}) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8000fffffffe) 16:05:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:05:32 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x4000000}}], 0x8000238, 0x0, 0x0) 16:05:32 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x500) 16:05:32 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffff97, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:05:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:05:32 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x700) 16:05:32 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r5, 0xc008551c, &(0x7f00000000c0)={0x2, 0x18, [0x9b88, 0x38a7, 0x4, 0x3, 0xff, 0x2]}) close(r0) r6 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r7 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r7, 0x208200) sendfile(r0, r6, 0x0, 0x8000fffffffe) 16:05:33 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffff97, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:05:33 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x6000000}}], 0x8000238, 0x0, 0x0) 16:05:33 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xa00) 16:05:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:05:33 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x7000000}}], 0x8000238, 0x0, 0x0) 16:05:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 16:05:33 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xe00) 16:05:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 16:05:33 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffff5, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:05:33 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x8000000}}], 0x8000238, 0x0, 0x0) 16:05:33 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x1100) 16:05:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 16:05:34 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffff5, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:05:34 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x1c00) 16:05:34 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x9000000}}], 0x8000238, 0x0, 0x0) 16:05:34 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r5, 0xc008551c, &(0x7f00000000c0)={0x2, 0x18, [0x9b88, 0x38a7, 0x4, 0x3, 0xff, 0x2]}) close(r0) r6 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r7 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r7, 0x208200) sendfile(r0, r6, 0x0, 0x8000fffffffe) 16:05:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 16:05:34 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0xa000000}}], 0x8000238, 0x0, 0x0) 16:05:34 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x2000) 16:05:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 16:05:34 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:05:34 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0xc000000}}], 0x8000238, 0x0, 0x0) 16:05:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 16:05:34 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xe0ff) 16:05:35 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:05:35 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0xe000000}}], 0x8000238, 0x0, 0x0) 16:05:35 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xe803) 16:05:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x0, 0x0) 16:05:35 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r5, 0xc008551c, &(0x7f00000000c0)={0x2, 0x18, [0x9b88, 0x38a7, 0x4, 0x3, 0xff, 0x2]}) close(r0) r6 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r7 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r7, 0x208200) sendfile(r0, r6, 0x0, 0x8000fffffffe) 16:05:35 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x10000000}}], 0x8000238, 0x0, 0x0) 16:05:35 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xf401) 16:05:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x0, 0x0) 16:05:36 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffffd, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:05:36 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x14000000}}], 0x8000238, 0x0, 0x0) 16:05:36 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xffe0) 16:05:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x0, 0x0) 16:05:36 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffffd, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:05:36 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r5, 0xc008551c, &(0x7f00000000c0)={0x2, 0x18, [0x9b88, 0x38a7, 0x4, 0x3, 0xff, 0x2]}) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r6 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r7 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r7, 0x208200) sendfile(r0, r6, 0x0, 0x8000fffffffe) 16:05:36 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x34000) 16:05:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 16:05:36 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x38100000}}], 0x8000238, 0x0, 0x0) 16:05:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 16:05:36 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x40000) 16:05:36 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x3f000000}}], 0x8000238, 0x0, 0x0) 16:05:37 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:05:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 16:05:37 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r5, 0xc008551c, &(0x7f00000000c0)={0x2, 0x18, [0x9b88, 0x38a7, 0x4, 0x3, 0xff, 0x2]}) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r6 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r7 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r7, 0x208200) sendfile(r0, r6, 0x0, 0x8000fffffffe) 16:05:37 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x40000000}}], 0x8000238, 0x0, 0x0) 16:05:37 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:05:37 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x400300) 16:05:37 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x50100000}}], 0x8000238, 0x0, 0x0) 16:05:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 16:05:37 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r5, 0xc008551c, &(0x7f00000000c0)={0x2, 0x18, [0x9b88, 0x38a7, 0x4, 0x3, 0xff, 0x2]}) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r6 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r7 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r7, 0x208200) sendfile(r0, r6, 0x0, 0x8000fffffffe) 16:05:37 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x1000000) 16:05:37 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x60000000}}], 0x8000238, 0x0, 0x0) 16:05:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 16:05:38 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:05:38 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x65580000}}], 0x8000238, 0x0, 0x0) 16:05:38 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x5000000) 16:05:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 16:05:38 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:05:38 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r6 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r7 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r7, 0x208200) sendfile(r0, r6, 0x0, 0x8000fffffffe) 16:05:38 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x74100000}}], 0x8000238, 0x0, 0x0) 16:05:38 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x7000000) 16:05:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x0, 0x0) 16:05:38 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x81000000}}], 0x8000238, 0x0, 0x0) 16:05:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x0, 0x0) 16:05:38 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xa000000) 16:05:39 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x4000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:05:39 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x88a8ffff}}], 0x8000238, 0x0, 0x0) 16:05:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x0, 0x0) 16:05:39 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xe000000) 16:05:39 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x4000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:05:39 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r4, r3, 0x0) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r5 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r0, r5, 0x0, 0x8000fffffffe) 16:05:39 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x11000000) 16:05:39 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0xb4020000}}], 0x8000238, 0x0, 0x0) 16:05:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x0, 0x0) 16:05:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x0, 0x0) 16:05:39 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0xcc0d0000}}], 0x8000238, 0x0, 0x0) 16:05:39 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x1c000000) 16:05:40 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x8000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:05:40 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x20000000) 16:05:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x0, 0x0) 16:05:40 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0xd40d0000}}], 0x8000238, 0x0, 0x0) 16:05:40 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x8000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:05:40 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r4, r3, 0x0) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r5 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r0, r5, 0x0, 0x8000fffffffe) 16:05:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 16:05:40 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xe0ffffff) 16:05:40 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0xffffa888}}], 0x8000238, 0x0, 0x0) 16:05:40 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xe8030000) 16:05:41 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x4000000000000}}], 0x8000238, 0x0, 0x0) 16:05:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 16:05:41 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x10000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:05:41 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xeffdffff) 16:05:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 16:05:41 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x40030000000000}}], 0x8000238, 0x0, 0x0) 16:05:41 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x10000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:05:41 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r4, r3, 0x0) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r5 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r0, r5, 0x0, 0x8000fffffffe) 16:05:41 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xf4010000) 16:05:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 16:05:41 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0xa0010000000000}}], 0x8000238, 0x0, 0x0) 16:05:42 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfeffffff) 16:05:42 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x100000000000000}}], 0x8000238, 0x0, 0x0) 16:05:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 16:05:42 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x6b6b6b00000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:05:42 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r3 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) 16:05:42 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xffff0000) 16:05:42 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x200000000000000}}], 0x8000238, 0x0, 0x0) 16:05:43 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x6b6b6b00000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:05:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 16:05:43 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfffffdef) 16:05:43 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x400000000000000}}], 0x8000238, 0x0, 0x0) 16:05:43 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r3 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) 16:05:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x0, 0x0) 16:05:43 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x600000000000000}}], 0x8000238, 0x0, 0x0) 16:05:43 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xffffff7f) 16:05:43 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xf83f0000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:05:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x0, 0x0) 16:05:43 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xffffffe0) 16:05:43 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x700000000000000}}], 0x8000238, 0x0, 0x0) 16:05:44 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xf83f0000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:05:44 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r3 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) 16:05:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x0, 0x0) 16:05:44 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfffffffe) 16:05:44 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x800000000000000}}], 0x8000238, 0x0, 0x0) 16:05:44 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x4000000000000) 16:05:44 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x900000000000000}}], 0x8000238, 0x0, 0x0) 16:05:44 executing program 3: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r4, r3, 0x0) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r5 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r0, r5, 0x0, 0x8000fffffffe) 16:05:44 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:05:44 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x40030000000000) 16:05:44 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0xa00000000000000}}], 0x8000238, 0x0, 0x0) 16:05:44 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0xc00000000000000}}], 0x8000238, 0x0, 0x0) 16:05:45 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:05:45 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x100000000000000) 16:05:45 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:05:45 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0xe00000000000000}}], 0x8000238, 0x0, 0x0) 16:05:45 executing program 3: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r5, 0xc008551c, &(0x7f00000000c0)={0x2, 0x18, [0x9b88, 0x38a7, 0x4, 0x3, 0xff, 0x2]}) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r6 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) sendfile(r0, r6, 0x0, 0x8000fffffffe) 16:05:45 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x1000000000000000}}], 0x8000238, 0x0, 0x0) 16:05:45 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x500000000000000) 16:05:45 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x1400000000000000}}], 0x8000238, 0x0, 0x0) 16:05:45 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:05:45 executing program 3 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:05:45 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x700000000000000) 16:05:45 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x3810000000000000}}], 0x8000238, 0x0, 0x0) [ 470.419986] FAULT_INJECTION: forcing a failure. [ 470.419986] name failslab, interval 1, probability 0, space 0, times 0 [ 470.454280] CPU: 1 PID: 18443 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 470.462134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 470.471652] Call Trace: [ 470.474270] dump_stack+0x197/0x210 [ 470.477931] should_fail.cold+0xa/0x1b [ 470.481847] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 470.486973] ? lock_downgrade+0x880/0x880 [ 470.491161] __should_failslab+0x121/0x190 [ 470.495423] should_failslab+0x9/0x14 [ 470.499246] __kmalloc+0x2e2/0x750 [ 470.502796] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 470.508352] ? fput+0x128/0x1a0 [ 470.511652] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 470.517207] ? strnlen_user+0x15f/0x1e0 [ 470.521203] ? __x64_sys_memfd_create+0x13c/0x470 [ 470.526116] __x64_sys_memfd_create+0x13c/0x470 [ 470.530818] ? memfd_fcntl+0x1750/0x1750 [ 470.534904] ? do_syscall_64+0x26/0x620 [ 470.538893] ? lockdep_hardirqs_on+0x415/0x5d0 [ 470.543503] ? trace_hardirqs_on+0x67/0x220 [ 470.547851] do_syscall_64+0xfd/0x620 [ 470.551671] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 470.556868] RIP: 0033:0x45a919 [ 470.560084] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 470.579002] RSP: 002b:00007eff745f6a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 470.586728] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045a919 [ 470.586742] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004bf9b2 [ 470.601323] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 470.601335] R10: 0000000000010000 R11: 0000000000000246 R12: 00007eff745f76d4 [ 470.601344] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:05:46 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xa00000000000000) 16:05:46 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x3f00000000000000}}], 0x8000238, 0x0, 0x0) 16:05:46 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:05:46 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:05:46 executing program 3 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 470.813494] FAULT_INJECTION: forcing a failure. [ 470.813494] name failslab, interval 1, probability 0, space 0, times 0 [ 470.846120] CPU: 1 PID: 18465 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 470.853980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 470.863460] Call Trace: [ 470.866086] dump_stack+0x197/0x210 [ 470.869753] should_fail.cold+0xa/0x1b [ 470.873667] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 470.878813] ? lock_downgrade+0x880/0x880 [ 470.883062] __should_failslab+0x121/0x190 [ 470.887339] should_failslab+0x9/0x14 [ 470.891178] kmem_cache_alloc+0x2ae/0x700 [ 470.895359] ? __alloc_fd+0x44d/0x560 [ 470.899308] ? shmem_destroy_callback+0xc0/0xc0 [ 470.904010] shmem_alloc_inode+0x1c/0x50 [ 470.908090] alloc_inode+0x64/0x190 [ 470.911750] new_inode_pseudo+0x19/0xf0 [ 470.915750] new_inode+0x1f/0x40 [ 470.919136] shmem_get_inode+0x84/0x780 [ 470.923140] __shmem_file_setup.part.0+0x7e/0x2b0 [ 470.928013] shmem_file_setup+0x66/0x90 [ 470.932024] __x64_sys_memfd_create+0x2a2/0x470 [ 470.936721] ? memfd_fcntl+0x1750/0x1750 [ 470.940810] ? do_syscall_64+0x26/0x620 [ 470.944839] ? lockdep_hardirqs_on+0x415/0x5d0 [ 470.949459] ? trace_hardirqs_on+0x67/0x220 [ 470.953809] do_syscall_64+0xfd/0x620 [ 470.957633] entry_SYSCALL_64_after_hwframe+0x49/0xbe 16:05:46 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x4000000000000000}}], 0x8000238, 0x0, 0x0) 16:05:46 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x5010000000000000}}], 0x8000238, 0x0, 0x0) [ 470.963795] RIP: 0033:0x45a919 [ 470.967003] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 470.985929] RSP: 002b:00007eff745f6a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 470.993665] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045a919 [ 471.000955] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004bf9b2 16:05:46 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xe00000000000000) [ 471.008251] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 471.015541] R10: 0000000000010000 R11: 0000000000000246 R12: 00007eff745f76d4 [ 471.022831] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:05:47 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:05:47 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x1100000000000000) 16:05:47 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:05:47 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x6000000000000000}}], 0x8000238, 0x0, 0x0) 16:05:47 executing program 3 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 471.609657] FAULT_INJECTION: forcing a failure. [ 471.609657] name failslab, interval 1, probability 0, space 0, times 0 16:05:47 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x6558000000000000}}], 0x8000238, 0x0, 0x0) 16:05:47 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x1c00000000000000) [ 471.757243] CPU: 1 PID: 18493 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 471.765109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 471.774482] Call Trace: [ 471.777096] dump_stack+0x197/0x210 [ 471.780759] should_fail.cold+0xa/0x1b [ 471.784675] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 471.789808] ? percpu_ref_put_many+0x94/0x190 [ 471.794348] __should_failslab+0x121/0x190 [ 471.798616] should_failslab+0x9/0x14 [ 471.802444] kmem_cache_alloc+0x2ae/0x700 [ 471.806619] ? map_id_range_down+0x1ee/0x370 [ 471.811060] ? __put_user_ns+0x70/0x70 [ 471.814979] selinux_inode_alloc_security+0xb6/0x2a0 [ 471.820112] security_inode_alloc+0x8a/0xd0 [ 471.824462] inode_init_always+0x56e/0xb40 [ 471.828716] alloc_inode+0x81/0x190 [ 471.832363] new_inode_pseudo+0x19/0xf0 [ 471.836354] new_inode+0x1f/0x40 [ 471.839733] shmem_get_inode+0x84/0x780 [ 471.843729] __shmem_file_setup.part.0+0x7e/0x2b0 [ 471.848588] shmem_file_setup+0x66/0x90 [ 471.852577] __x64_sys_memfd_create+0x2a2/0x470 [ 471.857266] ? memfd_fcntl+0x1750/0x1750 [ 471.861346] ? do_syscall_64+0x26/0x620 [ 471.865348] ? lockdep_hardirqs_on+0x415/0x5d0 [ 471.869965] ? trace_hardirqs_on+0x67/0x220 [ 471.874313] do_syscall_64+0xfd/0x620 [ 471.878140] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 471.883345] RIP: 0033:0x45a919 [ 471.886556] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 471.905483] RSP: 002b:00007eff745f6a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 471.913215] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045a919 [ 471.920511] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004bf9b2 [ 471.927802] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 471.935088] R10: 0000000000010000 R11: 0000000000000246 R12: 00007eff745f76d4 [ 471.942549] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:05:47 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x7410000000000000}}], 0x8000238, 0x0, 0x0) 16:05:47 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x2000000000000000) 16:05:47 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:05:47 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x8100000000000000}}], 0x8000238, 0x0, 0x0) 16:05:47 executing program 3 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 472.368234] FAULT_INJECTION: forcing a failure. [ 472.368234] name failslab, interval 1, probability 0, space 0, times 0 [ 472.408425] CPU: 1 PID: 18525 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 472.416281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.425784] Call Trace: [ 472.428406] dump_stack+0x197/0x210 [ 472.432070] should_fail.cold+0xa/0x1b [ 472.435992] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 472.441141] ? lock_downgrade+0x880/0x880 [ 472.445334] __should_failslab+0x121/0x190 [ 472.449602] should_failslab+0x9/0x14 [ 472.453430] kmem_cache_alloc+0x2ae/0x700 [ 472.457606] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 472.462736] ? lockdep_hardirqs_on+0x415/0x5d0 [ 472.467340] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 472.472896] ? timespec64_trunc+0xf0/0x180 [ 472.477158] __d_alloc+0x2e/0x9c0 [ 472.480636] ? ktime_get_coarse_real_ts64+0x1ba/0x2b0 [ 472.485857] d_alloc_pseudo+0x1e/0x70 [ 472.489681] alloc_file_pseudo+0xe2/0x280 [ 472.493849] ? __lockdep_init_map+0x10c/0x5b0 [ 472.498384] ? alloc_file+0x4d0/0x4d0 [ 472.502341] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 472.508004] ? kasan_check_write+0x14/0x20 [ 472.512307] __shmem_file_setup.part.0+0x108/0x2b0 [ 472.517275] shmem_file_setup+0x66/0x90 [ 472.521283] __x64_sys_memfd_create+0x2a2/0x470 [ 472.526603] ? memfd_fcntl+0x1750/0x1750 [ 472.530695] ? do_syscall_64+0x26/0x620 [ 472.534705] ? lockdep_hardirqs_on+0x415/0x5d0 [ 472.539336] ? trace_hardirqs_on+0x67/0x220 [ 472.543693] do_syscall_64+0xfd/0x620 [ 472.547526] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 472.552743] RIP: 0033:0x45a919 [ 472.555957] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 472.574876] RSP: 002b:00007eff745f6a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 472.582634] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045a919 [ 472.589933] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004bf9b2 [ 472.597214] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 472.604501] R10: 0000000000010000 R11: 0000000000000246 R12: 00007eff745f76d4 [ 472.611786] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:05:48 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:05:48 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xe0ffffffffffffff) 16:05:48 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x88a8ffff00000000}}], 0x8000238, 0x0, 0x0) 16:05:48 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r5 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r0, r5, 0x0, 0x8000fffffffe) 16:05:48 executing program 3 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 472.744688] FAULT_INJECTION: forcing a failure. [ 472.744688] name failslab, interval 1, probability 0, space 0, times 0 [ 472.806250] CPU: 0 PID: 18542 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 472.814102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.823563] Call Trace: [ 472.826184] dump_stack+0x197/0x210 [ 472.829870] should_fail.cold+0xa/0x1b [ 472.833817] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 472.838949] ? lock_downgrade+0x880/0x880 [ 472.838983] __should_failslab+0x121/0x190 [ 472.847355] should_failslab+0x9/0x14 [ 472.847372] kmem_cache_alloc+0x2ae/0x700 [ 472.847398] __alloc_file+0x27/0x330 [ 472.859098] alloc_empty_file+0x72/0x170 [ 472.863194] alloc_file+0x5e/0x4d0 [ 472.866781] alloc_file_pseudo+0x189/0x280 [ 472.871046] ? alloc_file+0x4d0/0x4d0 [ 472.874876] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 472.880451] ? kasan_check_write+0x14/0x20 [ 472.884717] __shmem_file_setup.part.0+0x108/0x2b0 [ 472.889676] shmem_file_setup+0x66/0x90 [ 472.893681] __x64_sys_memfd_create+0x2a2/0x470 [ 472.898377] ? memfd_fcntl+0x1750/0x1750 [ 472.902473] ? do_syscall_64+0x26/0x620 [ 472.906480] ? lockdep_hardirqs_on+0x415/0x5d0 [ 472.911177] ? trace_hardirqs_on+0x67/0x220 [ 472.915533] do_syscall_64+0xfd/0x620 [ 472.919364] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 472.924582] RIP: 0033:0x45a919 [ 472.927796] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 472.946719] RSP: 002b:00007eff745f6a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 16:05:48 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0xb402000000000000}}], 0x8000238, 0x0, 0x0) 16:05:48 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xe803000000000000) [ 472.954454] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045a919 [ 472.961749] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004bf9b2 [ 472.969039] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 472.976331] R10: 0000000000010000 R11: 0000000000000246 R12: 00007eff745f76d4 [ 472.983652] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:05:48 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0xcc0d000000000000}}], 0x8000238, 0x0, 0x0) 16:05:48 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xeffdffff00000000) 16:05:48 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:05:48 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0xd40d000000000000}}], 0x8000238, 0x0, 0x0) 16:05:48 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:05:49 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:05:49 executing program 3 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:05:49 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0xffffffff00000000}}], 0x8000238, 0x0, 0x0) 16:05:49 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xf401000000000000) 16:05:49 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) [ 473.829356] FAULT_INJECTION: forcing a failure. [ 473.829356] name failslab, interval 1, probability 0, space 0, times 0 [ 473.855448] CPU: 0 PID: 18585 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 473.863297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.872672] Call Trace: [ 473.875290] dump_stack+0x197/0x210 [ 473.878946] should_fail.cold+0xa/0x1b [ 473.882976] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 473.888119] ? lock_downgrade+0x880/0x880 [ 473.893272] __should_failslab+0x121/0x190 [ 473.897529] should_failslab+0x9/0x14 [ 473.901344] kmem_cache_alloc+0x2ae/0x700 [ 473.905512] ? rcu_read_lock_sched_held+0x110/0x130 [ 473.910560] selinux_file_alloc_security+0xb4/0x190 [ 473.915592] security_file_alloc+0x63/0xa0 [ 473.919848] __alloc_file+0xcf/0x330 [ 473.923579] alloc_empty_file+0x72/0x170 [ 473.933139] alloc_file+0x5e/0x4d0 [ 473.936697] alloc_file_pseudo+0x189/0x280 [ 473.940971] ? alloc_file+0x4d0/0x4d0 [ 473.944793] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 473.950352] ? kasan_check_write+0x14/0x20 [ 473.954604] __shmem_file_setup.part.0+0x108/0x2b0 [ 473.959551] shmem_file_setup+0x66/0x90 [ 473.963547] __x64_sys_memfd_create+0x2a2/0x470 [ 473.968227] ? memfd_fcntl+0x1750/0x1750 [ 473.972307] ? do_syscall_64+0x26/0x620 [ 473.976296] ? lockdep_hardirqs_on+0x415/0x5d0 [ 473.980899] ? trace_hardirqs_on+0x67/0x220 [ 473.985239] do_syscall_64+0xfd/0x620 [ 473.989057] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 473.994266] RIP: 0033:0x45a919 [ 473.997481] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 474.016398] RSP: 002b:00007eff745f6a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 16:05:49 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) 16:05:49 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfeffffff00000000) [ 474.024121] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045a919 [ 474.031400] RDX: 0000000020000058 RSI: 0000000000000000 RDI: 00000000004bf9b2 [ 474.038681] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 474.045974] R10: 0000000000010000 R11: 0000000000000246 R12: 00007eff745f76d4 [ 474.053263] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:05:49 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xffff000000000000) 16:05:49 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x2}}], 0x8000238, 0x0, 0x0) 16:05:49 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:05:49 executing program 3 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:05:49 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x4}}], 0x8000238, 0x0, 0x0) [ 474.488365] FAULT_INJECTION: forcing a failure. [ 474.488365] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 474.596367] CPU: 0 PID: 18619 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 474.604230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.613589] Call Trace: [ 474.616188] dump_stack+0x197/0x210 [ 474.619829] should_fail.cold+0xa/0x1b [ 474.623715] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 474.628837] ? __might_sleep+0x95/0x190 [ 474.632841] __alloc_pages_nodemask+0x1ee/0x750 [ 474.637524] ? lock_downgrade+0x880/0x880 [ 474.641708] ? __alloc_pages_slowpath+0x2870/0x2870 [ 474.646772] ? avc_has_perm_noaudit+0x3b6/0x570 [ 474.651451] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 474.657005] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 474.662555] alloc_pages_vma+0xdd/0x590 [ 474.666529] shmem_alloc_page+0xc0/0x180 [ 474.670586] ? shmem_swapin+0x1a0/0x1a0 [ 474.674569] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 474.680253] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 474.685275] ? __vm_enough_memory+0x324/0x5a0 [ 474.689776] shmem_alloc_and_acct_page+0x165/0x970 [ 474.694728] shmem_getpage_gfp+0x44a/0x3930 [ 474.699078] ? current_time+0x6f/0x140 [ 474.704382] ? shmem_writepage+0xf60/0xf60 [ 474.708632] ? current_time+0x6f/0x140 [ 474.712525] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 474.717623] ? lockdep_hardirqs_on+0x415/0x5d0 [ 474.722204] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 474.727750] ? iov_iter_fault_in_readable+0x22c/0x450 [ 474.732937] shmem_write_begin+0x10b/0x1e0 [ 474.737165] generic_perform_write+0x22a/0x520 [ 474.741751] ? page_endio+0x780/0x780 [ 474.745568] ? current_time+0x140/0x140 [ 474.749546] ? lock_acquire+0x16f/0x3f0 [ 474.753531] __generic_file_write_iter+0x25e/0x630 [ 474.758463] generic_file_write_iter+0x383/0x72f [ 474.763220] __vfs_write+0x587/0x810 [ 474.766936] ? kernel_read+0x120/0x120 [ 474.770830] ? rcu_read_lock_sched_held+0x110/0x130 [ 474.775853] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 474.780605] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 474.786147] ? __sb_start_write+0x1a9/0x360 [ 474.790478] vfs_write+0x20c/0x560 [ 474.794013] ksys_pwrite64+0x183/0x1c0 [ 474.797892] ? __ia32_sys_pread64+0xf0/0xf0 [ 474.802213] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 474.806960] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 474.811722] ? do_syscall_64+0x26/0x620 [ 474.815697] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 474.821054] ? do_syscall_64+0x26/0x620 [ 474.825023] __x64_sys_pwrite64+0x97/0xf0 [ 474.829170] do_syscall_64+0xfd/0x620 [ 474.833054] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 474.838233] RIP: 0033:0x414717 [ 474.841429] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 474.860348] RSP: 002b:00007eff745f6a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 474.868072] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 0000000000414717 [ 474.875441] RDX: 00000000000002e5 RSI: 0000000020000140 RDI: 0000000000000004 [ 474.882796] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 474.890068] R10: 0000000000010000 R11: 0000000000000293 R12: 00007eff745f76d4 [ 474.897514] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:05:50 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:05:50 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xffffff7f00000000) 16:05:50 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x6}}], 0x8000238, 0x0, 0x0) 16:05:50 executing program 3 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:05:50 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) [ 475.111455] FAULT_INJECTION: forcing a failure. [ 475.111455] name failslab, interval 1, probability 0, space 0, times 0 [ 475.123078] CPU: 1 PID: 18640 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 475.123120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.123126] Call Trace: [ 475.123150] dump_stack+0x197/0x210 [ 475.123172] should_fail.cold+0xa/0x1b [ 475.123191] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 475.123213] ? percpu_ref_put_many+0x94/0x190 16:05:50 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xffffffffffffffe0) [ 475.123234] __should_failslab+0x121/0x190 [ 475.123249] should_failslab+0x9/0x14 [ 475.123266] kmem_cache_alloc+0x47/0x700 [ 475.147658] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 475.179119] __radix_tree_create+0x32f/0x550 [ 475.183561] __radix_tree_insert+0xce/0x6b0 [ 475.188001] ? percpu_ref_put_many+0x94/0x190 [ 475.192520] ? __radix_tree_create+0x550/0x550 [ 475.197122] ? lock_acquire+0x16f/0x3f0 [ 475.201123] ? kasan_check_write+0x14/0x20 [ 475.205374] ? do_raw_spin_lock+0xc8/0x240 [ 475.205396] shmem_add_to_page_cache+0x6c7/0xd30 [ 475.205414] ? shmem_write_end+0x800/0x800 [ 475.218679] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 475.218692] ? __radix_tree_preload+0x215/0x290 [ 475.218715] shmem_getpage_gfp+0x23b6/0x3930 [ 475.233082] ? current_time+0x6f/0x140 [ 475.237008] ? shmem_writepage+0xf60/0xf60 [ 475.241266] ? current_time+0x6f/0x140 [ 475.245233] ? lockdep_hardirqs_on+0x415/0x5d0 [ 475.249846] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 475.255410] ? iov_iter_fault_in_readable+0x22c/0x450 [ 475.260645] shmem_write_begin+0x10b/0x1e0 [ 475.264915] generic_perform_write+0x22a/0x520 [ 475.269525] ? page_endio+0x780/0x780 [ 475.273346] ? current_time+0x140/0x140 [ 475.277355] ? lock_acquire+0x16f/0x3f0 [ 475.281392] __generic_file_write_iter+0x25e/0x630 [ 475.286355] generic_file_write_iter+0x383/0x72f [ 475.291925] __vfs_write+0x587/0x810 [ 475.295706] ? kernel_read+0x120/0x120 [ 475.299817] ? rcu_read_lock_sched_held+0x110/0x130 [ 475.304970] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 475.309757] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 475.315318] ? __sb_start_write+0x1a9/0x360 [ 475.319666] vfs_write+0x20c/0x560 [ 475.324798] ksys_pwrite64+0x183/0x1c0 [ 475.328893] ? __ia32_sys_pread64+0xf0/0xf0 [ 475.333232] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 475.338014] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 475.342801] ? do_syscall_64+0x26/0x620 [ 475.346806] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 475.352193] ? do_syscall_64+0x26/0x620 [ 475.356190] __x64_sys_pwrite64+0x97/0xf0 [ 475.360367] do_syscall_64+0xfd/0x620 [ 475.364890] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 475.370110] RIP: 0033:0x414717 [ 475.373329] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 475.392350] RSP: 002b:00007eff745f6a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 475.400085] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 0000000000414717 16:05:50 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r2) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 475.407546] RDX: 00000000000002e5 RSI: 0000000020000140 RDI: 0000000000000004 [ 475.414836] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 475.422127] R10: 0000000000010000 R11: 0000000000000293 R12: 00007eff745f76d4 [ 475.429423] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:05:50 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x7}}], 0x8000238, 0x0, 0x0) 16:05:51 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:05:51 executing program 3 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:05:51 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x8}}], 0x8000238, 0x0, 0x0) [ 475.732480] FAULT_INJECTION: forcing a failure. [ 475.732480] name failslab, interval 1, probability 0, space 0, times 0 16:05:51 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r4 = perf_event_open(&(0x7f0000000180)={0x4, 0xffffffffffffffe7, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r4, r3) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f00000000c0)={0x9, 0x0, 0x4, 0x80000000, 0x3, {0x77359400}, {0x8, 0x8, 0x3f, 0x3, 0x9, 0x8, "c0d03cb1"}, 0xfff, 0x2, @fd=r2, 0x1, 0x0, r4}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x404200) r6 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) r7 = gettid() rt_sigqueueinfo(r7, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffffa}) r8 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r8, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) r9 = dup(r8) perf_event_open(&(0x7f0000000000)={0xb2985ef910fe5a80, 0x70, 0x9, 0x90, 0x80, 0x40, 0x0, 0x40, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x20, 0x40}, 0x4040, 0x0, 0x0, 0x3, 0xfffffffffffffffa, 0x0, 0x382}, r7, 0x2, r9, 0x0) [ 475.830345] CPU: 1 PID: 18671 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 475.838418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.848962] Call Trace: [ 475.851587] dump_stack+0x197/0x210 [ 475.855324] should_fail.cold+0xa/0x1b [ 475.859238] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 475.864389] ? lock_downgrade+0x880/0x880 [ 475.868669] __should_failslab+0x121/0x190 [ 475.873013] should_failslab+0x9/0x14 [ 475.876919] kmem_cache_alloc+0x2ae/0x700 [ 475.881087] ? lock_downgrade+0x880/0x880 [ 475.885286] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 475.891024] ? check_preemption_disabled+0x48/0x290 [ 475.896282] getname_flags+0xd6/0x5b0 [ 475.900102] getname+0x1a/0x20 [ 475.903326] do_sys_open+0x2c9/0x550 [ 475.907070] ? filp_open+0x80/0x80 [ 475.910647] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 475.915437] ? do_syscall_64+0x26/0x620 [ 475.919431] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 475.925080] ? do_syscall_64+0x26/0x620 [ 475.929095] __x64_sys_open+0x7e/0xc0 [ 475.932922] do_syscall_64+0xfd/0x620 [ 475.936746] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 475.942055] RIP: 0033:0x4146b1 [ 475.945274] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 475.964372] RSP: 002b:00007eff745f6a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 475.972119] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 00000000004146b1 [ 475.979516] RDX: 00007eff745f6b0a RSI: 0000000000000002 RDI: 00007eff745f6b00 [ 475.987466] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 475.994850] R10: 0000000000000075 R11: 0000000000000293 R12: 00007eff745f76d4 [ 476.002141] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:05:51 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:05:51 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:05:51 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x9}}], 0x8000238, 0x0, 0x0) 16:05:51 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_ENUMAUDIO(r7, 0xc0345641, &(0x7f0000000040)={0x1000000, "c0218b530eab9f86cebc93c2e996272247883e37ab19c014132f7f661b0453c8", 0x1}) write$ppp(r4, &(0x7f0000000000)="df6d0c9203c85273f8014f5f6ad3", 0xe) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:05:51 executing program 3 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 476.509060] FAULT_INJECTION: forcing a failure. [ 476.509060] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 476.520948] CPU: 0 PID: 18693 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 476.528767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.538226] Call Trace: [ 476.540846] dump_stack+0x197/0x210 [ 476.544508] should_fail.cold+0xa/0x1b [ 476.548427] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 476.553673] ? mark_held_locks+0x100/0x100 [ 476.558054] __alloc_pages_nodemask+0x1ee/0x750 [ 476.562777] ? __alloc_pages_slowpath+0x2870/0x2870 [ 476.567873] ? find_held_lock+0x35/0x130 [ 476.571969] cache_grow_begin+0x91/0x8c0 [ 476.576145] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 476.582334] kmem_cache_alloc+0x63b/0x700 [ 476.586518] ? lock_downgrade+0x880/0x880 [ 476.590817] getname_flags+0xd6/0x5b0 [ 476.590836] getname+0x1a/0x20 [ 476.590855] do_sys_open+0x2c9/0x550 [ 476.601585] ? filp_open+0x80/0x80 [ 476.601613] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 476.601631] ? do_syscall_64+0x26/0x620 [ 476.601647] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 476.601665] ? do_syscall_64+0x26/0x620 [ 476.623739] __x64_sys_open+0x7e/0xc0 [ 476.627602] do_syscall_64+0xfd/0x620 [ 476.631448] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 476.636663] RIP: 0033:0x4146b1 [ 476.639880] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 16:05:52 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:05:52 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) [ 476.658978] RSP: 002b:00007eff745f6a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 476.666713] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 00000000004146b1 [ 476.674004] RDX: 00007eff745f6b0a RSI: 0000000000000002 RDI: 00007eff745f6b00 [ 476.681320] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 476.688791] R10: 0000000000000075 R11: 0000000000000293 R12: 00007eff745f76d4 [ 476.696608] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:05:52 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000000)={0x20000000}) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:05:52 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:05:52 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0xa}}], 0x8000238, 0x0, 0x0) 16:05:52 executing program 3 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 476.900738] FAULT_INJECTION: forcing a failure. [ 476.900738] name failslab, interval 1, probability 0, space 0, times 0 [ 476.971462] CPU: 0 PID: 18717 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 476.979527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.989116] Call Trace: [ 476.991859] dump_stack+0x197/0x210 [ 476.995538] should_fail.cold+0xa/0x1b [ 476.999586] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 477.004720] ? lock_downgrade+0x880/0x880 [ 477.010225] __should_failslab+0x121/0x190 [ 477.010242] should_failslab+0x9/0x14 [ 477.010260] kmem_cache_alloc+0x2ae/0x700 [ 477.022447] ? __save_stack_trace+0x99/0x100 [ 477.022472] __alloc_file+0x27/0x330 [ 477.030619] alloc_empty_file+0x72/0x170 [ 477.034704] path_openat+0xef/0x45e0 [ 477.038450] ? __lock_acquire+0x6ee/0x49c0 [ 477.042703] ? getname+0x1a/0x20 [ 477.046093] ? do_sys_open+0x2c9/0x550 [ 477.050094] ? __x64_sys_open+0x7e/0xc0 [ 477.054085] ? do_syscall_64+0xfd/0x620 [ 477.058080] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.063476] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 477.068172] ? __lock_is_held+0xb6/0x140 [ 477.072271] ? __alloc_fd+0x44d/0x560 [ 477.076101] do_filp_open+0x1a1/0x280 [ 477.079928] ? may_open_dev+0x100/0x100 [ 477.083940] ? lock_downgrade+0x880/0x880 [ 477.088124] ? do_raw_spin_unlock+0x178/0x270 [ 477.092642] ? _raw_spin_unlock+0x2d/0x50 [ 477.096851] ? __alloc_fd+0x44d/0x560 [ 477.100694] do_sys_open+0x3fe/0x550 [ 477.104436] ? filp_open+0x80/0x80 [ 477.108003] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 477.112785] ? do_syscall_64+0x26/0x620 [ 477.116786] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.122178] ? do_syscall_64+0x26/0x620 [ 477.126189] __x64_sys_open+0x7e/0xc0 [ 477.130013] do_syscall_64+0xfd/0x620 [ 477.133836] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.139044] RIP: 0033:0x4146b1 [ 477.142685] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 477.161596] RSP: 002b:00007eff745f6a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 16:05:52 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) [ 477.161612] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 00000000004146b1 [ 477.161621] RDX: 00007eff745f6b0a RSI: 0000000000000002 RDI: 00007eff745f6b00 [ 477.161634] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 477.183883] R10: 0000000000000075 R11: 0000000000000293 R12: 00007eff745f76d4 [ 477.183894] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:05:53 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:05:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r3 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) 16:05:53 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0xc}}], 0x8000238, 0x0, 0x0) 16:05:53 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000000)=0x2, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:05:53 executing program 3 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:05:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r3 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) [ 477.837851] FAULT_INJECTION: forcing a failure. [ 477.837851] name failslab, interval 1, probability 0, space 0, times 0 16:05:53 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0xe}}], 0x8000238, 0x0, 0x0) [ 477.947332] CPU: 0 PID: 18741 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 477.955294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.964683] Call Trace: [ 477.967411] dump_stack+0x197/0x210 [ 477.971084] should_fail.cold+0xa/0x1b [ 477.975014] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 477.980188] ? lock_downgrade+0x880/0x880 [ 477.984384] __should_failslab+0x121/0x190 [ 477.988666] should_failslab+0x9/0x14 [ 477.992504] kmem_cache_alloc+0x2ae/0x700 [ 477.996784] ? rcu_read_lock_sched_held+0x110/0x130 [ 478.001838] selinux_file_alloc_security+0xb4/0x190 [ 478.006885] security_file_alloc+0x63/0xa0 [ 478.011155] __alloc_file+0xcf/0x330 [ 478.014907] alloc_empty_file+0x72/0x170 [ 478.019010] path_openat+0xef/0x45e0 [ 478.022757] ? __lock_acquire+0x6ee/0x49c0 [ 478.027025] ? getname+0x1a/0x20 [ 478.030414] ? do_sys_open+0x2c9/0x550 [ 478.034332] ? __x64_sys_open+0x7e/0xc0 [ 478.038328] ? do_syscall_64+0xfd/0x620 [ 478.042340] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.047739] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 478.052430] ? __lock_is_held+0xb6/0x140 [ 478.056527] ? __alloc_fd+0x44d/0x560 [ 478.060358] do_filp_open+0x1a1/0x280 [ 478.064195] ? may_open_dev+0x100/0x100 [ 478.068196] ? lock_downgrade+0x880/0x880 [ 478.072448] ? do_raw_spin_unlock+0x178/0x270 [ 478.076949] ? _raw_spin_unlock+0x2d/0x50 [ 478.081113] ? __alloc_fd+0x44d/0x560 [ 478.084931] do_sys_open+0x3fe/0x550 [ 478.088667] ? filp_open+0x80/0x80 [ 478.092214] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 478.096962] ? do_syscall_64+0x26/0x620 [ 478.100929] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.106286] ? do_syscall_64+0x26/0x620 [ 478.110275] __x64_sys_open+0x7e/0xc0 [ 478.114091] do_syscall_64+0xfd/0x620 [ 478.117886] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.123063] RIP: 0033:0x4146b1 [ 478.126249] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 16:05:53 executing program 1: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x200, &(0x7f0000000080)=0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0xf3f5, 0x1000010001}) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000140)='\x00', 0x1}]) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r4 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r4, r3) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) io_cancel(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7, 0xff4d, r3, &(0x7f0000000000)="44465326b2136650e57c7740114c553bd19e5c526379b57c642d08b7d3d2f83e2a211c59fe2583040d77e1eff6b575a1cfd4b9740ac499fad1fb40e8b9a86cd22b3ab6a1940465cae9acec2176d845f42a5c599e03414e17a076a1401c7fc7437217fa70bf6b5f9edf10ff9affd1f93cfbb574156d7ed6f68faafe0507b7a8396d937452c1da491b2b56e6e29f023278ced1f33ae9f3c85366fdb34063d1567669a41fa0715de2aaefb0a44c32e07c97d65bfe70b34a43e934b033627e901a3999e74dfc17f3e364176c34f5c49853cda23f0873e4663c1c6c26e7c68ac037259173313c146941897d1cd3d243ae12ca4060", 0xf2, 0x59d, 0x0, 0x3, r5}, &(0x7f0000000180)) r6 = socket$kcm(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup3(r8, r7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$KVM_SIGNAL_MSI(r9, 0x4020aea5, &(0x7f00000001c0)={0x4, 0x3000, 0x2, 0x3, 0x4}) sendmsg$kcm(r6, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) r10 = mq_open(&(0x7f0000000300)=')posix_acl_accessproc\xb1wlan1!proc:\'#\'vboxnet0vmnet0\x00', 0x800, 0x20, &(0x7f0000000240)={0x10001, 0x7, 0x0, 0x33}) write$binfmt_misc(r10, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x62) 16:05:53 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 478.145237] RSP: 002b:00007eff745f6a60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 478.152947] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 00000000004146b1 [ 478.160206] RDX: 00007eff745f6b0a RSI: 0000000000000002 RDI: 00007eff745f6b00 [ 478.167463] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 478.174726] R10: 0000000000000075 R11: 0000000000000293 R12: 00007eff745f76d4 [ 478.181984] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:05:53 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x10}}], 0x8000238, 0x0, 0x0) 16:05:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r3 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) 16:05:53 executing program 3 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 478.396270] FAULT_INJECTION: forcing a failure. [ 478.396270] name failslab, interval 1, probability 0, space 0, times 0 [ 478.437453] CPU: 1 PID: 18771 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 478.445307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.454682] Call Trace: [ 478.457301] dump_stack+0x197/0x210 [ 478.460970] should_fail.cold+0xa/0x1b [ 478.464884] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 478.470018] ? lock_downgrade+0x880/0x880 [ 478.474206] __should_failslab+0x121/0x190 [ 478.478471] should_failslab+0x9/0x14 [ 478.482299] kmem_cache_alloc+0x2ae/0x700 [ 478.486476] ? __schedule+0x1495/0x1dc0 [ 478.490593] __kernfs_new_node+0xef/0x6f0 [ 478.494757] ? __schedule+0x1495/0x1dc0 [ 478.498758] ? _raw_spin_unlock_irq+0x28/0x90 [ 478.503308] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 478.508096] ? __lock_acquire+0x6ee/0x49c0 [ 478.512367] ? _raw_spin_unlock_irq+0x5e/0x90 [ 478.516888] ? __schedule+0x1495/0x1dc0 [ 478.521088] ? __lock_is_held+0xb6/0x140 [ 478.525192] kernfs_new_node+0x99/0x130 [ 478.529193] kernfs_create_dir_ns+0x52/0x160 [ 478.533624] internal_create_group+0x1cb/0xc30 [ 478.538221] ? bd_set_size+0x89/0xb0 [ 478.541969] ? remove_files.isra.0+0x190/0x190 [ 478.546586] sysfs_create_group+0x20/0x30 [ 478.550764] lo_ioctl+0xf8f/0x20e0 [ 478.554326] ? lo_rw_aio+0x1470/0x1470 [ 478.558229] blkdev_ioctl+0xc38/0x1ab6 [ 478.562142] ? blkpg_ioctl+0xa90/0xa90 [ 478.566044] ? find_held_lock+0x35/0x130 [ 478.570213] ? debug_check_no_obj_freed+0x200/0x464 [ 478.575254] ? __fget+0x340/0x540 [ 478.578733] block_ioctl+0xee/0x130 [ 478.582373] ? blkdev_fallocate+0x410/0x410 [ 478.586709] do_vfs_ioctl+0xd5f/0x1380 [ 478.590610] ? selinux_file_ioctl+0x46f/0x5e0 [ 478.595135] ? selinux_file_ioctl+0x125/0x5e0 [ 478.599659] ? ioctl_preallocate+0x210/0x210 [ 478.604098] ? selinux_file_mprotect+0x620/0x620 [ 478.608883] ? iterate_fd+0x360/0x360 [ 478.612705] ? do_sys_open+0x31d/0x550 [ 478.616617] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 478.622174] ? security_file_ioctl+0x8d/0xc0 [ 478.626605] ksys_ioctl+0xab/0xd0 [ 478.630081] __x64_sys_ioctl+0x73/0xb0 [ 478.633988] do_syscall_64+0xfd/0x620 [ 478.637898] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.643192] RIP: 0033:0x45a787 [ 478.646400] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 478.665596] RSP: 002b:00007eff745f6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 478.673327] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045a787 [ 478.680617] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 478.687905] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 478.695285] R10: 0000000000000075 R11: 0000000000000246 R12: 00007eff745f76d4 [ 478.702859] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:05:54 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:05:54 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x14}}], 0x8000238, 0x0, 0x0) 16:05:54 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:05:54 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$TCSETS2(r2, 0x402c542b, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "edb59888d06433cf859cd75572fd12f070b6f3"}) gettid() r3 = socket$kcm(0x2, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) r6 = socket(0x1e, 0x4, 0x0) ioctl(r2, 0xffffffff, &(0x7f0000000180)="75127333") setsockopt$packet_tx_ring(r6, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r7 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x10, 0x3, 0xc8, &(0x7f00000001c0)={0xffffffffffffffff}) connect$rose(r8, &(0x7f0000000200)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, 0x0, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast]}, 0x40) dup2(r7, r6) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000040)={0xe26, 0x3, 0x4, 0x0, 0x8, {r4, r5/1000+10000}, {0x2, 0x0, 0x3, 0x4, 0x0, 0xfc, "9fdc2672"}, 0x7, 0x1, @fd, 0x4, 0x0, r7}) ioctl$SIOCGIFMTU(r9, 0x8921, &(0x7f0000000140)) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:05:54 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x60}}], 0x8000238, 0x0, 0x0) 16:05:54 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:05:54 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xd0f}, 0x2000, 0x0, 0x1000, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) r5 = dup3(0xffffffffffffffff, r3, 0x80000) ioctl$PIO_FONTX(r5, 0x4b6c, &(0x7f0000000000)={0x52, 0x20, &(0x7f0000000400)="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"}) ioctl$BINDER_SET_MAX_THREADS(r4, 0x40046205, &(0x7f0000000040)=0x8) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SCSI_IOCTL_START_UNIT(r8, 0x5) 16:05:54 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x2b4}}], 0x8000238, 0x0, 0x0) 16:05:54 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:05:54 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:05:54 executing program 3 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:05:54 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x600}}], 0x8000238, 0x0, 0x0) [ 479.706426] FAULT_INJECTION: forcing a failure. [ 479.706426] name failslab, interval 1, probability 0, space 0, times 0 [ 479.725001] CPU: 0 PID: 18831 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 479.733000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.742371] Call Trace: [ 479.744984] dump_stack+0x197/0x210 [ 479.748721] should_fail.cold+0xa/0x1b [ 479.752628] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 479.757755] ? lock_downgrade+0x880/0x880 [ 479.761941] __should_failslab+0x121/0x190 [ 479.766188] should_failslab+0x9/0x14 [ 479.770000] kmem_cache_alloc+0x2ae/0x700 [ 479.774164] ? __schedule+0x1495/0x1dc0 [ 479.778158] __kernfs_new_node+0xef/0x6f0 [ 479.782316] ? __schedule+0x1495/0x1dc0 [ 479.786315] ? _raw_spin_unlock_irq+0x28/0x90 [ 479.790831] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 479.795600] ? __lock_acquire+0x6ee/0x49c0 [ 479.799847] ? _raw_spin_unlock_irq+0x5e/0x90 [ 479.804354] ? __schedule+0x1495/0x1dc0 [ 479.808687] ? __lock_is_held+0xb6/0x140 [ 479.812773] kernfs_new_node+0x99/0x130 [ 479.816767] kernfs_create_dir_ns+0x52/0x160 [ 479.821192] internal_create_group+0x1cb/0xc30 [ 479.825786] ? bd_set_size+0x89/0xb0 [ 479.829529] ? remove_files.isra.0+0x190/0x190 [ 479.834166] sysfs_create_group+0x20/0x30 [ 479.838335] lo_ioctl+0xf8f/0x20e0 [ 479.841904] ? lo_rw_aio+0x1470/0x1470 [ 479.845812] blkdev_ioctl+0xc38/0x1ab6 [ 479.849829] ? blkpg_ioctl+0xa90/0xa90 [ 479.853739] ? find_held_lock+0x35/0x130 [ 479.857819] ? debug_check_no_obj_freed+0x200/0x464 [ 479.862856] ? __fget+0x340/0x540 [ 479.866332] block_ioctl+0xee/0x130 [ 479.870099] ? blkdev_fallocate+0x410/0x410 [ 479.874442] do_vfs_ioctl+0xd5f/0x1380 [ 479.878349] ? selinux_file_ioctl+0x46f/0x5e0 [ 479.882858] ? selinux_file_ioctl+0x125/0x5e0 [ 479.887372] ? ioctl_preallocate+0x210/0x210 [ 479.891789] ? selinux_file_mprotect+0x620/0x620 [ 479.896562] ? iterate_fd+0x360/0x360 [ 479.900392] ? do_sys_open+0x31d/0x550 [ 479.904309] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 479.909866] ? security_file_ioctl+0x8d/0xc0 [ 479.914299] ksys_ioctl+0xab/0xd0 [ 479.917766] __x64_sys_ioctl+0x73/0xb0 [ 479.921671] do_syscall_64+0xfd/0x620 [ 479.925496] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 479.930692] RIP: 0033:0x45a787 [ 479.933891] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 479.952806] RSP: 002b:00007eff745f6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 479.960527] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045a787 [ 479.967813] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 479.975092] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 479.982377] R10: 0000000000000075 R11: 0000000000000246 R12: 00007eff745f76d4 [ 479.989656] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:05:55 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1f00000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:05:55 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) r1 = socket$kcm(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$PPPIOCGIDLE(r5, 0x8010743f, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$tipc(0x1e, 0x2, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r4, 0x40087705, &(0x7f0000000000)={0x75607293, 0x7}) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:05:55 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:05:55 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x700}}], 0x8000238, 0x0, 0x0) 16:05:55 executing program 3 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 480.212685] FAULT_INJECTION: forcing a failure. [ 480.212685] name failslab, interval 1, probability 0, space 0, times 0 [ 480.224537] CPU: 0 PID: 18846 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 480.232361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.241997] Call Trace: [ 480.244617] dump_stack+0x197/0x210 [ 480.248276] should_fail.cold+0xa/0x1b [ 480.252196] ? is_bpf_text_address+0xd3/0x170 [ 480.256726] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 480.261855] ? __kernel_text_address+0xd/0x40 [ 480.266370] ? unwind_get_return_address+0x61/0xa0 [ 480.271330] __should_failslab+0x121/0x190 [ 480.275583] should_failslab+0x9/0x14 [ 480.279399] kmem_cache_alloc+0x47/0x700 [ 480.283484] ? save_stack+0xa9/0xd0 [ 480.287132] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 480.292775] idr_get_free+0x527/0xa28 [ 480.296611] idr_alloc_u32+0x1d6/0x390 [ 480.300530] ? __fprop_inc_percpu_max+0x230/0x230 [ 480.305395] ? __lock_is_held+0xb6/0x140 [ 480.309472] ? should_fail+0x14d/0x85c [ 480.313383] ? __lock_is_held+0xb6/0x140 [ 480.317468] idr_alloc_cyclic+0x132/0x270 [ 480.321640] ? idr_alloc+0x150/0x150 [ 480.325371] ? kasan_check_write+0x14/0x20 [ 480.329621] ? do_raw_spin_lock+0xc8/0x240 [ 480.333873] __kernfs_new_node+0x139/0x6f0 [ 480.338134] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 480.342914] ? __lock_acquire+0x6ee/0x49c0 [ 480.347175] ? __lock_is_held+0xb6/0x140 [ 480.351301] kernfs_new_node+0x99/0x130 [ 480.355293] kernfs_create_dir_ns+0x52/0x160 [ 480.359731] internal_create_group+0x1cb/0xc30 [ 480.364336] ? bd_set_size+0x89/0xb0 [ 480.368077] ? remove_files.isra.0+0x190/0x190 [ 480.372686] sysfs_create_group+0x20/0x30 [ 480.376851] lo_ioctl+0xf8f/0x20e0 [ 480.380415] ? lo_rw_aio+0x1470/0x1470 [ 480.384324] blkdev_ioctl+0xc38/0x1ab6 [ 480.388232] ? blkpg_ioctl+0xa90/0xa90 [ 480.392134] ? find_held_lock+0x35/0x130 [ 480.396214] ? debug_check_no_obj_freed+0x200/0x464 [ 480.401261] ? __fget+0x340/0x540 [ 480.404758] block_ioctl+0xee/0x130 [ 480.408405] ? blkdev_fallocate+0x410/0x410 16:05:55 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:05:55 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1f00000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:05:55 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) getsockname$netrom(r0, &(0x7f00000000c0)={{0x3, @rose}, [@default, @null, @netrom, @null, @bcast, @netrom, @default, @rose]}, &(0x7f0000000040)=0x48) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$kcm(0x2, 0x2, 0x0) r3 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) r4 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x7, 0x81800) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast2}, 0xfffffe95, 0x0, 0x0, 0x0, 0xffffffffffffff11}, 0x0) [ 480.412754] do_vfs_ioctl+0xd5f/0x1380 [ 480.416661] ? selinux_file_ioctl+0x46f/0x5e0 [ 480.421168] ? selinux_file_ioctl+0x125/0x5e0 [ 480.425724] ? ioctl_preallocate+0x210/0x210 [ 480.430214] ? selinux_file_mprotect+0x620/0x620 [ 480.435035] ? iterate_fd+0x360/0x360 [ 480.438829] ? do_sys_open+0x31d/0x550 [ 480.442800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 480.448356] ? security_file_ioctl+0x8d/0xc0 [ 480.452892] ksys_ioctl+0xab/0xd0 [ 480.456354] __x64_sys_ioctl+0x73/0xb0 [ 480.460261] do_syscall_64+0xfd/0x620 [ 480.464080] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 480.469268] RIP: 0033:0x45a787 [ 480.472452] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 480.491363] RSP: 002b:00007eff745f6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 480.499092] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045a787 [ 480.506377] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 480.513646] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 480.520972] R10: 0000000000000075 R11: 0000000000000246 R12: 00007eff745f76d4 [ 480.528255] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:05:56 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x900}}], 0x8000238, 0x0, 0x0) 16:05:56 executing program 3 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:05:56 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:05:56 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0xa00}}], 0x8000238, 0x0, 0x0) [ 480.827469] FAULT_INJECTION: forcing a failure. [ 480.827469] name failslab, interval 1, probability 0, space 0, times 0 [ 480.854613] CPU: 0 PID: 18878 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 480.862571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.871947] Call Trace: [ 480.874565] dump_stack+0x197/0x210 [ 480.878220] should_fail.cold+0xa/0x1b [ 480.882154] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 480.887285] ? lock_downgrade+0x880/0x880 [ 480.891471] __should_failslab+0x121/0x190 [ 480.895729] should_failslab+0x9/0x14 [ 480.899547] kmem_cache_alloc+0x2ae/0x700 [ 480.903730] ? lock_downgrade+0x880/0x880 [ 480.907908] __kernfs_new_node+0xef/0x6f0 [ 480.912076] ? kasan_check_write+0x14/0x20 [ 480.916333] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 480.921111] ? wait_for_completion+0x440/0x440 [ 480.925834] ? mutex_unlock+0xd/0x10 [ 480.929569] ? kernfs_activate+0x192/0x1f0 [ 480.933825] kernfs_new_node+0x99/0x130 [ 480.937838] __kernfs_create_file+0x51/0x33b [ 480.942293] sysfs_add_file_mode_ns+0x222/0x560 [ 480.946994] internal_create_group+0x383/0xc30 [ 480.951598] ? bd_set_size+0x89/0xb0 [ 480.955338] ? remove_files.isra.0+0x190/0x190 [ 480.959948] sysfs_create_group+0x20/0x30 [ 480.964111] lo_ioctl+0xf8f/0x20e0 [ 480.967695] ? lo_rw_aio+0x1470/0x1470 [ 480.971609] blkdev_ioctl+0xc38/0x1ab6 [ 480.975510] ? blkpg_ioctl+0xa90/0xa90 [ 480.979413] ? find_held_lock+0x35/0x130 [ 480.983490] ? debug_check_no_obj_freed+0x200/0x464 [ 480.988533] ? __fget+0x340/0x540 [ 480.992011] block_ioctl+0xee/0x130 [ 480.995650] ? blkdev_fallocate+0x410/0x410 [ 480.999989] do_vfs_ioctl+0xd5f/0x1380 [ 481.003895] ? selinux_file_ioctl+0x46f/0x5e0 [ 481.008406] ? selinux_file_ioctl+0x125/0x5e0 [ 481.012916] ? ioctl_preallocate+0x210/0x210 [ 481.017339] ? selinux_file_mprotect+0x620/0x620 [ 481.022133] ? iterate_fd+0x360/0x360 [ 481.025955] ? do_sys_open+0x31d/0x550 [ 481.029874] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 481.035431] ? security_file_ioctl+0x8d/0xc0 [ 481.039868] ksys_ioctl+0xab/0xd0 [ 481.043339] __x64_sys_ioctl+0x73/0xb0 [ 481.047243] do_syscall_64+0xfd/0x620 [ 481.051061] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 481.056260] RIP: 0033:0x45a787 [ 481.059464] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 481.078502] RSP: 002b:00007eff745f6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 481.086239] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045a787 [ 481.093531] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 481.100816] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 481.108107] R10: 0000000000000075 R11: 0000000000000246 R12: 00007eff745f76d4 [ 481.115396] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:05:57 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:05:57 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4) r3 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:05:57 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0xc00}}], 0x8000238, 0x0, 0x0) 16:05:57 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:05:57 executing program 3 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:05:57 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 481.582177] FAULT_INJECTION: forcing a failure. [ 481.582177] name failslab, interval 1, probability 0, space 0, times 0 [ 481.607132] CPU: 0 PID: 18901 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 481.614996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.624372] Call Trace: [ 481.626988] dump_stack+0x197/0x210 16:05:57 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:05:57 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0xdcc}}], 0x8000238, 0x0, 0x0) [ 481.630650] should_fail.cold+0xa/0x1b [ 481.634571] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 481.639702] ? lock_downgrade+0x880/0x880 [ 481.643878] __should_failslab+0x121/0x190 [ 481.648131] should_failslab+0x9/0x14 [ 481.651947] kmem_cache_alloc+0x2ae/0x700 [ 481.656119] ? lock_downgrade+0x880/0x880 [ 481.660301] __kernfs_new_node+0xef/0x6f0 [ 481.664472] ? kasan_check_write+0x14/0x20 [ 481.668739] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 481.673527] ? wait_for_completion+0x440/0x440 [ 481.678130] ? mutex_unlock+0xd/0x10 [ 481.681873] ? kernfs_activate+0x192/0x1f0 [ 481.686172] kernfs_new_node+0x99/0x130 [ 481.690151] __kernfs_create_file+0x51/0x33b [ 481.694606] sysfs_add_file_mode_ns+0x222/0x560 [ 481.699285] internal_create_group+0x383/0xc30 [ 481.704044] ? bd_set_size+0x89/0xb0 [ 481.707785] ? remove_files.isra.0+0x190/0x190 [ 481.712376] sysfs_create_group+0x20/0x30 [ 481.716531] lo_ioctl+0xf8f/0x20e0 [ 481.720088] ? lo_rw_aio+0x1470/0x1470 [ 481.723988] blkdev_ioctl+0xc38/0x1ab6 [ 481.727871] ? blkpg_ioctl+0xa90/0xa90 [ 481.731797] ? find_held_lock+0x35/0x130 [ 481.735973] ? debug_check_no_obj_freed+0x200/0x464 [ 481.741002] ? __fget+0x340/0x540 [ 481.744460] block_ioctl+0xee/0x130 [ 481.748084] ? blkdev_fallocate+0x410/0x410 [ 481.752424] do_vfs_ioctl+0xd5f/0x1380 [ 481.756315] ? selinux_file_ioctl+0x46f/0x5e0 [ 481.760828] ? selinux_file_ioctl+0x125/0x5e0 [ 481.765335] ? ioctl_preallocate+0x210/0x210 [ 481.769737] ? selinux_file_mprotect+0x620/0x620 [ 481.774495] ? iterate_fd+0x360/0x360 [ 481.778304] ? do_sys_open+0x31d/0x550 [ 481.782198] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 481.787732] ? security_file_ioctl+0x8d/0xc0 [ 481.792134] ksys_ioctl+0xab/0xd0 [ 481.795593] __x64_sys_ioctl+0x73/0xb0 [ 481.799505] do_syscall_64+0xfd/0x620 [ 481.803313] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 481.808527] RIP: 0033:0x45a787 [ 481.811741] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 481.830649] RSP: 002b:00007eff745f6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 481.838361] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045a787 [ 481.845638] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 481.852913] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 481.860554] R10: 0000000000000075 R11: 0000000000000246 R12: 00007eff745f76d4 [ 481.867833] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:05:57 executing program 3 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:05:57 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0xdd4}}], 0x8000238, 0x0, 0x0) 16:05:57 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) r2 = dup(r1) getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x80, &(0x7f0000000000)={'broute\x00'}, &(0x7f0000000080)=0x78) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r7, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r5, 0x84, 0x5, &(0x7f0000002c00)={r7, @in6={{0xa, 0x4e22, 0x1ff, @loopback}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000280)={r7, @in6={{0xa, 0x0, 0x1, @local, 0xbc5}}, 0x0, 0x3f, 0x0, 0xff, 0xf4ade3832108ff31}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r7, 0x4, 0x8}, &(0x7f0000000100)=0xc) [ 482.107600] FAULT_INJECTION: forcing a failure. [ 482.107600] name failslab, interval 1, probability 0, space 0, times 0 [ 482.158969] CPU: 1 PID: 18926 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 482.166829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.176215] Call Trace: [ 482.178838] dump_stack+0x197/0x210 [ 482.182496] should_fail.cold+0xa/0x1b [ 482.186438] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 482.191578] ? lock_downgrade+0x880/0x880 [ 482.195769] __should_failslab+0x121/0x190 [ 482.200031] should_failslab+0x9/0x14 [ 482.203852] kmem_cache_alloc+0x2ae/0x700 [ 482.208026] ? lock_downgrade+0x880/0x880 [ 482.212208] __kernfs_new_node+0xef/0x6f0 [ 482.216383] ? kasan_check_write+0x14/0x20 [ 482.220640] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 482.225450] ? wait_for_completion+0x440/0x440 [ 482.230100] ? mutex_unlock+0xd/0x10 [ 482.234023] ? kernfs_activate+0x192/0x1f0 [ 482.238313] kernfs_new_node+0x99/0x130 [ 482.242326] __kernfs_create_file+0x51/0x33b [ 482.246761] sysfs_add_file_mode_ns+0x222/0x560 [ 482.251482] internal_create_group+0x383/0xc30 [ 482.256168] ? bd_set_size+0x89/0xb0 [ 482.260005] ? remove_files.isra.0+0x190/0x190 [ 482.264634] sysfs_create_group+0x20/0x30 [ 482.268788] lo_ioctl+0xf8f/0x20e0 [ 482.274717] ? lo_rw_aio+0x1470/0x1470 [ 482.278617] blkdev_ioctl+0xc38/0x1ab6 [ 482.282508] ? blkpg_ioctl+0xa90/0xa90 [ 482.286477] ? find_held_lock+0x35/0x130 [ 482.290554] ? debug_check_no_obj_freed+0x200/0x464 [ 482.295571] ? __fget+0x340/0x540 [ 482.299133] block_ioctl+0xee/0x130 [ 482.302754] ? blkdev_fallocate+0x410/0x410 [ 482.307069] do_vfs_ioctl+0xd5f/0x1380 [ 482.310950] ? selinux_file_ioctl+0x46f/0x5e0 [ 482.315438] ? selinux_file_ioctl+0x125/0x5e0 [ 482.319928] ? ioctl_preallocate+0x210/0x210 [ 482.324694] ? selinux_file_mprotect+0x620/0x620 [ 482.329465] ? iterate_fd+0x360/0x360 [ 482.333263] ? do_sys_open+0x31d/0x550 [ 482.337155] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 482.342691] ? security_file_ioctl+0x8d/0xc0 [ 482.347095] ksys_ioctl+0xab/0xd0 [ 482.350548] __x64_sys_ioctl+0x73/0xb0 [ 482.354454] do_syscall_64+0xfd/0x620 [ 482.358248] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 482.363426] RIP: 0033:0x45a787 [ 482.366623] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 482.385530] RSP: 002b:00007eff745f6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 482.393243] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045a787 [ 482.400504] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 16:05:57 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) [ 482.407946] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 482.415208] R10: 0000000000000075 R11: 0000000000000246 R12: 00007eff745f76d4 [ 482.422516] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:05:58 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2200000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:05:58 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0xe00}}], 0x8000238, 0x0, 0x0) 16:05:58 executing program 3 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:05:58 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:05:58 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockname$inet(r4, &(0x7f0000000680)={0x2, 0x0, @multicast2}, &(0x7f00000006c0)=0x10) r5 = dup2(r3, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) linkat(r8, &(0x7f0000000080)='./file0\x00', r5, &(0x7f00000000c0)='./file0\x00', 0x3c00) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000100)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}) ioctl$sock_bt_hci(r2, 0x400448e1, &(0x7f0000000000)="740aaadeb8ff5277705e3dd14c90ca968dcd66e33b0f9cffea21a3751e57dd95139f590082a750318df72dcf2d5fe2a6f751d71bdf2c23aa6e2e8398207bf054ddbc1bb249bff104") sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:05:58 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2200000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:05:58 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x1038}}], 0x8000238, 0x0, 0x0) 16:05:58 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r3, 0xc058565d, &(0x7f0000000040)={0x43, 0x9, 0x4, 0xbf76fcb0b8783297, 0x7, {r4, r5/1000+30000}, {0x4, 0x2, 0x20, 0x0, 0x20, 0x0, "28eafc9d"}, 0x2, 0x4, @offset=0x8, 0x6, 0x0, 0xffffffffffffffff}) ioctl$USBDEVFS_DISCARDURB(r6, 0x550b, &(0x7f00000000c0)=0x4) r7 = socket$kcm(0x2, 0x2, 0x0) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x80, 0x0) getpeername$netrom(r8, &(0x7f0000000180)={{0x3, @bcast}, [@rose, @null, @remote, @rose, @remote, @rose, @null, @bcast]}, &(0x7f0000000200)=0x48) sendmsg$kcm(r7, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:05:58 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x1050}}], 0x8000238, 0x0, 0x0) 16:05:58 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:05:58 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x1074}}], 0x8000238, 0x0, 0x0) 16:05:58 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x4c, 0x0}, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r2) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000000)) [ 483.404222] FAULT_INJECTION: forcing a failure. [ 483.404222] name failslab, interval 1, probability 0, space 0, times 0 [ 483.439339] CPU: 1 PID: 18987 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 483.447256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.456651] Call Trace: [ 483.459272] dump_stack+0x197/0x210 [ 483.462968] should_fail.cold+0xa/0x1b [ 483.466895] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 483.472024] ? lock_downgrade+0x880/0x880 [ 483.476201] __should_failslab+0x121/0x190 [ 483.480474] should_failslab+0x9/0x14 [ 483.484285] kmem_cache_alloc+0x2ae/0x700 [ 483.488463] ? lock_downgrade+0x880/0x880 [ 483.492659] __kernfs_new_node+0xef/0x6f0 [ 483.496822] ? kasan_check_write+0x14/0x20 [ 483.501080] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 483.505854] ? wait_for_completion+0x440/0x440 [ 483.510464] ? mutex_unlock+0xd/0x10 [ 483.514200] ? kernfs_activate+0x192/0x1f0 [ 483.518474] kernfs_new_node+0x99/0x130 [ 483.522476] __kernfs_create_file+0x51/0x33b [ 483.527030] sysfs_add_file_mode_ns+0x222/0x560 [ 483.531787] internal_create_group+0x383/0xc30 [ 483.536390] ? bd_set_size+0x89/0xb0 [ 483.540136] ? remove_files.isra.0+0x190/0x190 [ 483.544939] sysfs_create_group+0x20/0x30 [ 483.549591] lo_ioctl+0xf8f/0x20e0 [ 483.553328] ? lo_rw_aio+0x1470/0x1470 [ 483.557257] blkdev_ioctl+0xc38/0x1ab6 [ 483.561160] ? blkpg_ioctl+0xa90/0xa90 [ 483.565159] ? find_held_lock+0x35/0x130 [ 483.569413] ? debug_check_no_obj_freed+0x200/0x464 [ 483.574897] ? __fget+0x340/0x540 [ 483.578647] block_ioctl+0xee/0x130 [ 483.582286] ? blkdev_fallocate+0x410/0x410 [ 483.586623] do_vfs_ioctl+0xd5f/0x1380 [ 483.590526] ? selinux_file_ioctl+0x46f/0x5e0 [ 483.595032] ? selinux_file_ioctl+0x125/0x5e0 [ 483.599548] ? ioctl_preallocate+0x210/0x210 [ 483.603975] ? selinux_file_mprotect+0x620/0x620 [ 483.608751] ? iterate_fd+0x360/0x360 [ 483.612591] ? do_sys_open+0x31d/0x550 [ 483.616513] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 483.622273] ? security_file_ioctl+0x8d/0xc0 [ 483.626718] ksys_ioctl+0xab/0xd0 [ 483.630206] __x64_sys_ioctl+0x73/0xb0 [ 483.634120] do_syscall_64+0xfd/0x620 [ 483.637947] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 483.643175] RIP: 0033:0x45a787 [ 483.646391] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 483.665313] RSP: 002b:00007eff745f6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 483.673041] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045a787 [ 483.680507] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 483.687813] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 483.695135] R10: 0000000000000075 R11: 0000000000000246 R12: 00007eff745f76d4 [ 483.702425] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:05:59 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2c00000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:05:59 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x1400}}], 0x8000238, 0x0, 0x0) 16:05:59 executing program 1: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x2, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x3, 0x3, 0x3, 0x0, 0x0, 0x9, 0x40000, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xac, 0x4, @perf_config_ext={0x3a2, 0x7}, 0x10000, 0x7, 0x7, 0x2, 0xdbd9, 0x5e8, 0x8}, 0x0, 0xc, 0xffffffffffffffff, 0xb89cca453460eea7) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0x7) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f00000000c0)=0x3, 0x4) sendmsg$kcm(r0, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0, 0xffffffffffffffb9}, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r2) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r5 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = dup2(r5, r4) ioctl$SIOCAX25DELFWD(r4, 0x89eb, &(0x7f0000000100)={@default, @null}) accept(r6, &(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000280)=0x80) setsockopt$inet_tcp_TCP_MD5SIG(r7, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x4e21, @local}}, 0x0, 0x0, 0x1c, 0x0, "8704896ff8bb7abc795ebffadf2869ab0a6cc5f72f69d757f2e8a3a2f28ef96dbec9d184a2cd58ffb46ebe5297d73f84e0d5518a778cd26316caf6ca4db1ba34658ed47f19b0b1ac6a1e66bd8f7358ca"}, 0xd8) 16:05:59 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:05:59 executing program 3 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 484.008728] FAULT_INJECTION: forcing a failure. [ 484.008728] name failslab, interval 1, probability 0, space 0, times 0 [ 484.024439] CPU: 1 PID: 19003 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 484.032416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 484.041781] Call Trace: [ 484.044372] dump_stack+0x197/0x210 [ 484.048006] should_fail.cold+0xa/0x1b [ 484.051894] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 484.057008] ? lock_downgrade+0x880/0x880 [ 484.061174] __should_failslab+0x121/0x190 [ 484.065415] should_failslab+0x9/0x14 [ 484.069223] kmem_cache_alloc+0x2ae/0x700 [ 484.073364] ? lock_downgrade+0x880/0x880 [ 484.077527] __kernfs_new_node+0xef/0x6f0 [ 484.081677] ? kasan_check_write+0x14/0x20 [ 484.085914] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 484.090674] ? wait_for_completion+0x440/0x440 [ 484.095256] ? mutex_unlock+0xd/0x10 [ 484.098974] ? kernfs_activate+0x192/0x1f0 [ 484.103212] kernfs_new_node+0x99/0x130 [ 484.107183] __kernfs_create_file+0x51/0x33b [ 484.111673] sysfs_add_file_mode_ns+0x222/0x560 [ 484.116344] internal_create_group+0x383/0xc30 [ 484.120919] ? bd_set_size+0x89/0xb0 [ 484.124648] ? remove_files.isra.0+0x190/0x190 [ 484.129266] sysfs_create_group+0x20/0x30 [ 484.133429] lo_ioctl+0xf8f/0x20e0 [ 484.136982] ? lo_rw_aio+0x1470/0x1470 [ 484.141018] blkdev_ioctl+0xc38/0x1ab6 [ 484.144963] ? blkpg_ioctl+0xa90/0xa90 [ 484.148853] ? find_held_lock+0x35/0x130 [ 484.152943] ? debug_check_no_obj_freed+0x200/0x464 [ 484.157985] ? __fget+0x340/0x540 [ 484.161447] block_ioctl+0xee/0x130 [ 484.165080] ? blkdev_fallocate+0x410/0x410 [ 484.169397] do_vfs_ioctl+0xd5f/0x1380 [ 484.173293] ? selinux_file_ioctl+0x46f/0x5e0 [ 484.177780] ? selinux_file_ioctl+0x125/0x5e0 [ 484.182266] ? ioctl_preallocate+0x210/0x210 [ 484.186680] ? selinux_file_mprotect+0x620/0x620 [ 484.191443] ? iterate_fd+0x360/0x360 [ 484.195237] ? do_sys_open+0x31d/0x550 [ 484.199140] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 484.204671] ? security_file_ioctl+0x8d/0xc0 [ 484.209086] ksys_ioctl+0xab/0xd0 [ 484.212540] __x64_sys_ioctl+0x73/0xb0 [ 484.216855] do_syscall_64+0xfd/0x620 [ 484.220653] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 484.225992] RIP: 0033:0x45a787 [ 484.229275] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 484.248427] RSP: 002b:00007eff745f6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 16:05:59 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2c00000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 484.256995] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045a787 [ 484.264267] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 484.271526] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 484.278791] R10: 0000000000000075 R11: 0000000000000246 R12: 00007eff745f76d4 [ 484.286330] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:05:59 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:05:59 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x3810}}], 0x8000238, 0x0, 0x0) 16:05:59 executing program 3 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:00 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) chdir(&(0x7f0000000300)='./file0\x00') r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) lseek(r1, 0x0, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x2, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r3, 0xc040564a, &(0x7f0000000140)={0x4, 0x0, 0x1010, 0x4, 0x9, 0x1000, 0x64c}) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:06:00 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x3f00}}], 0x8000238, 0x0, 0x0) [ 484.577745] FAULT_INJECTION: forcing a failure. [ 484.577745] name failslab, interval 1, probability 0, space 0, times 0 16:06:00 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) [ 484.621850] CPU: 0 PID: 19027 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 484.629705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 484.639778] Call Trace: [ 484.642398] dump_stack+0x197/0x210 [ 484.646066] should_fail.cold+0xa/0x1b [ 484.650005] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 484.655248] ? lock_downgrade+0x880/0x880 [ 484.659454] __should_failslab+0x121/0x190 [ 484.664515] should_failslab+0x9/0x14 [ 484.668346] kmem_cache_alloc_trace+0x2cc/0x760 [ 484.673049] kobject_uevent_env+0x387/0x101f [ 484.677500] kobject_uevent+0x20/0x26 [ 484.681893] lo_ioctl+0x100b/0x20e0 [ 484.685542] ? lo_rw_aio+0x1470/0x1470 [ 484.689444] blkdev_ioctl+0xc38/0x1ab6 [ 484.693344] ? blkpg_ioctl+0xa90/0xa90 [ 484.697351] ? find_held_lock+0x35/0x130 [ 484.701609] ? debug_check_no_obj_freed+0x200/0x464 [ 484.706850] ? __fget+0x340/0x540 [ 484.711262] block_ioctl+0xee/0x130 [ 484.714937] ? blkdev_fallocate+0x410/0x410 [ 484.719453] do_vfs_ioctl+0xd5f/0x1380 [ 484.723369] ? selinux_file_ioctl+0x46f/0x5e0 [ 484.727909] ? selinux_file_ioctl+0x125/0x5e0 [ 484.732424] ? ioctl_preallocate+0x210/0x210 [ 484.737002] ? selinux_file_mprotect+0x620/0x620 [ 484.741790] ? iterate_fd+0x360/0x360 [ 484.745610] ? do_sys_open+0x31d/0x550 [ 484.749522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 484.755193] ? security_file_ioctl+0x8d/0xc0 [ 484.759726] ksys_ioctl+0xab/0xd0 [ 484.763416] __x64_sys_ioctl+0x73/0xb0 [ 484.768004] do_syscall_64+0xfd/0x620 [ 484.771844] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 484.777133] RIP: 0033:0x45a787 [ 484.780340] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 484.799414] RSP: 002b:00007eff745f6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 484.807234] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045a787 [ 484.814515] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 484.821886] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 484.829184] R10: 0000000000000075 R11: 0000000000000246 R12: 00007eff745f76d4 [ 484.836462] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 [ 484.973338] overlayfs: failed to resolve 'file0': -2 16:06:00 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2d00000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:00 executing program 3 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:00 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:00 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x4000}}], 0x8000238, 0x0, 0x0) 16:06:00 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) [ 485.305479] FAULT_INJECTION: forcing a failure. [ 485.305479] name failslab, interval 1, probability 0, space 0, times 0 [ 485.317483] CPU: 1 PID: 19049 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 485.325307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 485.334864] Call Trace: [ 485.337487] dump_stack+0x197/0x210 [ 485.341145] should_fail.cold+0xa/0x1b [ 485.345060] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 485.350546] ? lock_downgrade+0x880/0x880 [ 485.354756] __should_failslab+0x121/0x190 [ 485.359027] should_failslab+0x9/0x14 [ 485.362860] __kmalloc+0x2e2/0x750 [ 485.366465] ? rcu_read_lock_sched_held+0x110/0x130 [ 485.371526] ? kobject_get_path+0xc4/0x1b0 [ 485.375804] kobject_get_path+0xc4/0x1b0 [ 485.379956] kobject_uevent_env+0x3ab/0x101f [ 485.384420] kobject_uevent+0x20/0x26 [ 485.388251] lo_ioctl+0x100b/0x20e0 [ 485.392083] ? lo_rw_aio+0x1470/0x1470 [ 485.395990] blkdev_ioctl+0xc38/0x1ab6 [ 485.399912] ? blkpg_ioctl+0xa90/0xa90 [ 485.403815] ? find_held_lock+0x35/0x130 [ 485.407896] ? debug_check_no_obj_freed+0x200/0x464 [ 485.412938] ? __fget+0x340/0x540 [ 485.416427] block_ioctl+0xee/0x130 [ 485.420255] ? blkdev_fallocate+0x410/0x410 [ 485.424754] do_vfs_ioctl+0xd5f/0x1380 [ 485.428750] ? selinux_file_ioctl+0x46f/0x5e0 [ 485.433270] ? selinux_file_ioctl+0x125/0x5e0 [ 485.437781] ? ioctl_preallocate+0x210/0x210 [ 485.442317] ? selinux_file_mprotect+0x620/0x620 [ 485.447280] ? iterate_fd+0x360/0x360 [ 485.451361] ? do_sys_open+0x31d/0x550 [ 485.455272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 485.460836] ? security_file_ioctl+0x8d/0xc0 [ 485.465263] ksys_ioctl+0xab/0xd0 [ 485.468735] __x64_sys_ioctl+0x73/0xb0 [ 485.472780] do_syscall_64+0xfd/0x620 [ 485.476607] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 485.481843] RIP: 0033:0x45a787 [ 485.485058] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:06:01 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2d00000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:06:01 executing program 1: r0 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getrusage(0x1, &(0x7f00000002c0)) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x40000, 0x0) r5 = gettid() rt_sigqueueinfo(r5, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffffa}) r6 = syz_open_procfs(r5, &(0x7f0000000100)='net/packet\x00') sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2040000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x50, r1, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x401}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x5}, @NBD_ATTR_SOCKETS={0x24, 0x7, [{0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r6}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x10}, 0x1) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000280)={0x1, 0x40, &(0x7f0000000240)="dc5dc070287284e2bab87b37858830a2848a40c4c245e7e9a8eb212b5d6d5df5554b2b39c468c10ab17010eb9803a35b7e611d94648b63a23cb6e5a772522a26"}) socket$kcm(0x2b, 0x1, 0x0) r7 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) [ 485.503998] RSP: 002b:00007eff745f6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 485.511750] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045a787 [ 485.519038] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 485.526330] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 485.533615] R10: 0000000000000075 R11: 0000000000000246 R12: 00007eff745f76d4 [ 485.540918] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:01 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x5010}}], 0x8000238, 0x0, 0x0) 16:06:01 executing program 3 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:01 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:01 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0xa, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) 16:06:01 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x5865}}], 0x8000238, 0x0, 0x0) [ 485.805518] FAULT_INJECTION: forcing a failure. [ 485.805518] name failslab, interval 1, probability 0, space 0, times 0 [ 485.849184] CPU: 0 PID: 19078 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 485.857122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 485.866501] Call Trace: [ 485.869111] dump_stack+0x197/0x210 [ 485.872765] should_fail.cold+0xa/0x1b [ 485.876678] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 485.881803] ? lock_downgrade+0x880/0x880 [ 485.885987] __should_failslab+0x121/0x190 [ 485.890250] should_failslab+0x9/0x14 [ 485.894072] kmem_cache_alloc_node+0x26c/0x710 [ 485.898685] ? find_held_lock+0x35/0x130 [ 485.902774] __alloc_skb+0xd5/0x5f0 [ 485.906413] ? skb_trim+0x190/0x190 [ 485.910059] ? kasan_check_read+0x11/0x20 [ 485.914227] alloc_uevent_skb+0x83/0x1e2 [ 485.918308] kobject_uevent_env+0xaa3/0x101f [ 485.922740] kobject_uevent+0x20/0x26 [ 485.926561] lo_ioctl+0x100b/0x20e0 [ 485.930205] ? lo_rw_aio+0x1470/0x1470 [ 485.934901] blkdev_ioctl+0xc38/0x1ab6 [ 485.938811] ? blkpg_ioctl+0xa90/0xa90 [ 485.942711] ? find_held_lock+0x35/0x130 [ 485.946786] ? debug_check_no_obj_freed+0x200/0x464 [ 485.951820] ? __fget+0x340/0x540 [ 485.955298] block_ioctl+0xee/0x130 [ 485.959370] ? blkdev_fallocate+0x410/0x410 [ 485.963807] do_vfs_ioctl+0xd5f/0x1380 [ 485.967725] ? selinux_file_ioctl+0x46f/0x5e0 [ 485.972258] ? selinux_file_ioctl+0x125/0x5e0 [ 485.976941] ? ioctl_preallocate+0x210/0x210 [ 485.981369] ? selinux_file_mprotect+0x620/0x620 [ 485.986147] ? iterate_fd+0x360/0x360 [ 485.989967] ? do_sys_open+0x31d/0x550 [ 485.993905] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 485.999458] ? security_file_ioctl+0x8d/0xc0 [ 486.003884] ksys_ioctl+0xab/0xd0 [ 486.007350] __x64_sys_ioctl+0x73/0xb0 [ 486.011252] do_syscall_64+0xfd/0x620 [ 486.015071] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 486.020455] RIP: 0033:0x45a787 [ 486.023657] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 486.042831] RSP: 002b:00007eff745f6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 486.050732] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045a787 [ 486.058020] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 486.065323] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 486.072601] R10: 0000000000000075 R11: 0000000000000246 R12: 00007eff745f76d4 [ 486.079973] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 [ 486.175913] syz-executor.1 uses obsolete (PF_INET,SOCK_PACKET) 16:06:02 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3b00000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:02 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r2 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r3, 0x208200) sendfile(r0, r2, 0x0, 0x8000fffffffe) 16:06:02 executing program 3 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:02 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x6000}}], 0x8000238, 0x0, 0x0) 16:06:02 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysfs$3(0x3) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:06:02 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3b00000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 486.628212] FAULT_INJECTION: forcing a failure. [ 486.628212] name failslab, interval 1, probability 0, space 0, times 0 16:06:02 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x6558}}], 0x8000238, 0x0, 0x0) 16:06:02 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r1, 0x8983, &(0x7f00000001c0)={0x7, 'syzkaller0\x00', {0x8000}, 0x7}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket(0x1e, 0x4, 0x0) socketpair(0x8, 0x5, 0x8, &(0x7f0000000240)={0xffffffffffffffff}) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000180)=@req3={0x4, 0x401, 0x9, 0x0, 0xfffffa36, 0x6, 0x5}, 0x1c) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r6 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup2(r9, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup2(r12, r11) dup2(r13, r7) dup2(r6, r5) r14 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r14, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) r15 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r15, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r16 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r16, r15) socket(0x1e, 0x0, 0x0) [ 486.674864] CPU: 1 PID: 19107 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 486.682724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.692100] Call Trace: [ 486.694718] dump_stack+0x197/0x210 [ 486.698390] should_fail.cold+0xa/0x1b [ 486.702492] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 486.707611] ? lock_downgrade+0x880/0x880 [ 486.711787] __should_failslab+0x121/0x190 [ 486.716043] should_failslab+0x9/0x14 [ 486.719868] kmem_cache_alloc_node_trace+0x274/0x720 16:06:02 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r2 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r3, 0x208200) sendfile(r0, r2, 0x0, 0x8000fffffffe) [ 486.724993] ? __alloc_skb+0xd5/0x5f0 [ 486.728821] __kmalloc_node_track_caller+0x3d/0x80 [ 486.733763] __kmalloc_reserve.isra.0+0x40/0xf0 [ 486.738430] __alloc_skb+0x10b/0x5f0 [ 486.742148] ? skb_trim+0x190/0x190 [ 486.745833] ? kasan_check_read+0x11/0x20 [ 486.749980] alloc_uevent_skb+0x83/0x1e2 [ 486.754039] kobject_uevent_env+0xaa3/0x101f [ 486.758492] kobject_uevent+0x20/0x26 [ 486.762385] lo_ioctl+0x100b/0x20e0 [ 486.766017] ? lo_rw_aio+0x1470/0x1470 [ 486.769933] blkdev_ioctl+0xc38/0x1ab6 [ 486.773906] ? blkpg_ioctl+0xa90/0xa90 [ 486.777876] ? find_held_lock+0x35/0x130 [ 486.781935] ? debug_check_no_obj_freed+0x200/0x464 [ 486.786946] ? __fget+0x340/0x540 [ 486.790674] block_ioctl+0xee/0x130 [ 486.794398] ? blkdev_fallocate+0x410/0x410 [ 486.799070] do_vfs_ioctl+0xd5f/0x1380 [ 486.802969] ? selinux_file_ioctl+0x46f/0x5e0 [ 486.807464] ? selinux_file_ioctl+0x125/0x5e0 [ 486.811967] ? ioctl_preallocate+0x210/0x210 [ 486.816384] ? selinux_file_mprotect+0x620/0x620 [ 486.821157] ? iterate_fd+0x360/0x360 [ 486.825126] ? do_sys_open+0x31d/0x550 [ 486.829184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 486.834723] ? security_file_ioctl+0x8d/0xc0 [ 486.839134] ksys_ioctl+0xab/0xd0 [ 486.842599] __x64_sys_ioctl+0x73/0xb0 [ 486.846477] do_syscall_64+0xfd/0x620 [ 486.850297] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 486.855521] RIP: 0033:0x45a787 [ 486.858706] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 486.877623] RSP: 002b:00007eff745f6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 486.885341] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045a787 [ 486.892729] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 486.900215] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 486.907532] R10: 0000000000000075 R11: 0000000000000246 R12: 00007eff745f76d4 [ 486.914803] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 [ 487.033092] audit: type=1400 audit(1577117162.515:82): avc: denied { ioctl } for pid=19117 comm="syz-executor.1" path="socket:[69601]" dev="sockfs" ino=69601 ioctlcmd=0x8983 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 16:06:02 executing program 3 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:02 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x7410}}], 0x8000238, 0x0, 0x0) 16:06:02 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r2 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r3, 0x208200) sendfile(r0, r2, 0x0, 0x8000fffffffe) [ 487.209746] FAULT_INJECTION: forcing a failure. [ 487.209746] name failslab, interval 1, probability 0, space 0, times 0 [ 487.263242] CPU: 0 PID: 19131 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 487.271101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 487.280471] Call Trace: [ 487.283079] dump_stack+0x197/0x210 [ 487.287166] should_fail.cold+0xa/0x1b [ 487.291073] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 487.296631] ? lock_downgrade+0x880/0x880 [ 487.300829] __should_failslab+0x121/0x190 [ 487.305097] should_failslab+0x9/0x14 [ 487.308927] kmem_cache_alloc_node_trace+0x274/0x720 [ 487.314053] ? __alloc_skb+0xd5/0x5f0 [ 487.317917] __kmalloc_node_track_caller+0x3d/0x80 [ 487.322860] __kmalloc_reserve.isra.0+0x40/0xf0 [ 487.327541] __alloc_skb+0x10b/0x5f0 [ 487.331263] ? skb_trim+0x190/0x190 [ 487.334905] ? kasan_check_read+0x11/0x20 [ 487.339090] alloc_uevent_skb+0x83/0x1e2 [ 487.343225] kobject_uevent_env+0xaa3/0x101f [ 487.347679] kobject_uevent+0x20/0x26 [ 487.351503] lo_ioctl+0x100b/0x20e0 [ 487.355153] ? lo_rw_aio+0x1470/0x1470 [ 487.359069] blkdev_ioctl+0xc38/0x1ab6 [ 487.362979] ? blkpg_ioctl+0xa90/0xa90 [ 487.366888] ? find_held_lock+0x35/0x130 [ 487.370974] ? debug_check_no_obj_freed+0x200/0x464 [ 487.376023] ? __fget+0x340/0x540 [ 487.379605] block_ioctl+0xee/0x130 [ 487.383278] ? blkdev_fallocate+0x410/0x410 [ 487.387742] do_vfs_ioctl+0xd5f/0x1380 [ 487.391856] ? selinux_file_ioctl+0x46f/0x5e0 [ 487.396371] ? selinux_file_ioctl+0x125/0x5e0 [ 487.400885] ? ioctl_preallocate+0x210/0x210 [ 487.405578] ? selinux_file_mprotect+0x620/0x620 [ 487.410387] ? iterate_fd+0x360/0x360 [ 487.414235] ? do_sys_open+0x31d/0x550 [ 487.418150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 487.424240] ? security_file_ioctl+0x8d/0xc0 [ 487.428674] ksys_ioctl+0xab/0xd0 [ 487.432166] __x64_sys_ioctl+0x73/0xb0 [ 487.436075] do_syscall_64+0xfd/0x620 [ 487.440341] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 487.445544] RIP: 0033:0x45a787 [ 487.448762] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 487.467713] RSP: 002b:00007eff745f6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 487.475545] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045a787 [ 487.482948] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 487.490371] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 487.497657] R10: 0000000000000075 R11: 0000000000000246 R12: 00007eff745f76d4 [ 487.504961] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:03 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:03 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x8100}}], 0x8000238, 0x0, 0x0) 16:06:03 executing program 3 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:03 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r2) fsetxattr$trusted_overlay_nlink(r3, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'U-', 0x8}, 0x16, 0x1) 16:06:03 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup3(0xffffffffffffffff, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r3 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) [ 488.001564] FAULT_INJECTION: forcing a failure. [ 488.001564] name failslab, interval 1, probability 0, space 0, times 0 [ 488.023235] CPU: 0 PID: 19157 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 488.031163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.040607] Call Trace: [ 488.043204] dump_stack+0x197/0x210 [ 488.046831] should_fail.cold+0xa/0x1b [ 488.050716] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 488.055897] ? lock_downgrade+0x880/0x880 [ 488.060056] __should_failslab+0x121/0x190 [ 488.064476] should_failslab+0x9/0x14 [ 488.068278] kmem_cache_alloc+0x2ae/0x700 [ 488.072424] ? lock_downgrade+0x880/0x880 [ 488.076581] skb_clone+0x156/0x3e0 [ 488.080133] netlink_broadcast_filtered+0x875/0xb30 [ 488.085167] netlink_broadcast+0x3a/0x50 [ 488.089256] kobject_uevent_env+0xad6/0x101f [ 488.093710] kobject_uevent+0x20/0x26 [ 488.097527] lo_ioctl+0x100b/0x20e0 [ 488.101146] ? lo_rw_aio+0x1470/0x1470 [ 488.105051] blkdev_ioctl+0xc38/0x1ab6 [ 488.109023] ? blkpg_ioctl+0xa90/0xa90 [ 488.112944] ? find_held_lock+0x35/0x130 [ 488.117025] ? debug_check_no_obj_freed+0x200/0x464 [ 488.122055] ? __fget+0x340/0x540 [ 488.125739] block_ioctl+0xee/0x130 [ 488.129402] ? blkdev_fallocate+0x410/0x410 [ 488.133805] do_vfs_ioctl+0xd5f/0x1380 [ 488.137689] ? selinux_file_ioctl+0x46f/0x5e0 [ 488.142190] ? selinux_file_ioctl+0x125/0x5e0 [ 488.146685] ? ioctl_preallocate+0x210/0x210 [ 488.151100] ? selinux_file_mprotect+0x620/0x620 [ 488.156548] ? iterate_fd+0x360/0x360 [ 488.160348] ? do_sys_open+0x31d/0x550 [ 488.164242] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 488.169774] ? security_file_ioctl+0x8d/0xc0 [ 488.174191] ksys_ioctl+0xab/0xd0 [ 488.177752] __x64_sys_ioctl+0x73/0xb0 [ 488.181630] do_syscall_64+0xfd/0x620 [ 488.185420] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 488.190608] RIP: 0033:0x45a787 [ 488.193791] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 488.212703] RSP: 002b:00007eff745f6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 488.220412] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045a787 [ 488.227687] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 488.234952] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 488.242222] R10: 0000000000000075 R11: 0000000000000246 R12: 00007eff745f76d4 16:06:03 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:06:03 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0xb402}}], 0x8000238, 0x0, 0x0) 16:06:03 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup3(0xffffffffffffffff, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r3 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) [ 488.249494] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:03 executing program 1: r0 = socket$kcm(0x2b, 0x6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:06:03 executing program 3 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:03 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup3(0xffffffffffffffff, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r3 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) 16:06:03 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0xcc0d}}], 0x8000238, 0x0, 0x0) [ 488.504636] FAULT_INJECTION: forcing a failure. [ 488.504636] name failslab, interval 1, probability 0, space 0, times 0 [ 488.556855] CPU: 1 PID: 19179 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 488.565408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.574783] Call Trace: [ 488.577401] dump_stack+0x197/0x210 [ 488.581067] should_fail.cold+0xa/0x1b [ 488.584982] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 488.590136] ? lock_downgrade+0x880/0x880 [ 488.594325] __should_failslab+0x121/0x190 [ 488.598587] should_failslab+0x9/0x14 [ 488.602427] kmem_cache_alloc+0x2ae/0x700 [ 488.606611] getname_flags+0xd6/0x5b0 [ 488.610448] do_mkdirat+0xa0/0x2a0 [ 488.614012] ? __ia32_sys_mknod+0xb0/0xb0 [ 488.618184] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 488.622961] ? do_syscall_64+0x26/0x620 [ 488.626951] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 488.632351] ? do_syscall_64+0x26/0x620 [ 488.636354] ? lockdep_hardirqs_on+0x415/0x5d0 [ 488.640959] __x64_sys_mkdir+0x5c/0x80 [ 488.644872] do_syscall_64+0xfd/0x620 [ 488.648701] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 488.653907] RIP: 0033:0x459d37 [ 488.657123] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 488.676043] RSP: 002b:00007eff745f6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 488.676060] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 0000000000459d37 [ 488.676070] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 488.676079] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 488.676087] R10: 0000000000000075 R11: 0000000000000246 R12: 00007eff745f76d4 [ 488.676101] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:04 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:04 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x2, 0x0) r1 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x406, 0x9}}, 0x0, 0x5, 0xffffffffffffffff, 0x8) dup2(r3, r2) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@ethernet={0x1}, 0xe4, 0x0}, 0x0) 16:06:04 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r3 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) 16:06:04 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0xd40d}}], 0x8000238, 0x0, 0x0) 16:06:04 executing program 3 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 489.285383] FAULT_INJECTION: forcing a failure. [ 489.285383] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 489.297690] CPU: 0 PID: 19193 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 489.305506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.315484] Call Trace: [ 489.318095] dump_stack+0x197/0x210 [ 489.321765] should_fail.cold+0xa/0x1b [ 489.325693] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 489.330854] ? mark_held_locks+0x100/0x100 [ 489.335117] ? blkdev_ioctl+0x12e/0x1ab6 [ 489.339213] __alloc_pages_nodemask+0x1ee/0x750 [ 489.343902] ? debug_check_no_obj_freed+0x200/0x464 [ 489.349030] ? __alloc_pages_slowpath+0x2870/0x2870 [ 489.354063] ? find_held_lock+0x35/0x130 [ 489.358158] cache_grow_begin+0x91/0x8c0 [ 489.362237] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 489.367799] kmem_cache_alloc+0x63b/0x700 [ 489.371980] getname_flags+0xd6/0x5b0 [ 489.375815] do_mkdirat+0xa0/0x2a0 [ 489.379391] ? __ia32_sys_mknod+0xb0/0xb0 [ 489.383581] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 489.388367] ? do_syscall_64+0x26/0x620 [ 489.392457] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 489.397859] ? do_syscall_64+0x26/0x620 [ 489.401856] ? lockdep_hardirqs_on+0x415/0x5d0 [ 489.406475] __x64_sys_mkdir+0x5c/0x80 [ 489.410391] do_syscall_64+0xfd/0x620 [ 489.414213] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 489.419421] RIP: 0033:0x459d37 [ 489.422629] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 489.441544] RSP: 002b:00007eff745f6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 489.449276] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 0000000000459d37 [ 489.456564] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 489.463856] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 489.471146] R10: 0000000000000075 R11: 0000000000000246 R12: 00007eff745f76d4 [ 489.478442] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:05 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:06:05 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x1a000}}], 0x8000238, 0x0, 0x0) 16:06:05 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84800) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x6000) 16:06:05 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r3 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) 16:06:05 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x34000}}], 0x8000238, 0x0, 0x0) 16:06:05 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r3 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) 16:06:05 executing program 3 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 490.309654] FAULT_INJECTION: forcing a failure. [ 490.309654] name failslab, interval 1, probability 0, space 0, times 0 [ 490.336829] CPU: 1 PID: 19218 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 490.344683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 490.354069] Call Trace: [ 490.356687] dump_stack+0x197/0x210 [ 490.360346] should_fail.cold+0xa/0x1b [ 490.364259] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 490.369471] ? lockdep_hardirqs_on+0x415/0x5d0 [ 490.374116] __should_failslab+0x121/0x190 [ 490.378417] should_failslab+0x9/0x14 [ 490.382236] kmem_cache_alloc+0x2ae/0x700 [ 490.386403] ? map_id_range_down+0x1ee/0x370 [ 490.390837] ? __put_user_ns+0x70/0x70 [ 490.394838] selinux_inode_alloc_security+0xb6/0x2a0 [ 490.399961] security_inode_alloc+0x8a/0xd0 [ 490.404308] inode_init_always+0x56e/0xb40 [ 490.408562] alloc_inode+0x81/0x190 [ 490.412215] new_inode_pseudo+0x19/0xf0 [ 490.417338] new_inode+0x1f/0x40 [ 490.420721] __ext4_new_inode+0x3cb/0x52d0 [ 490.424994] ? kasan_check_read+0x11/0x20 [ 490.429172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 490.435337] ? ext4_free_inode+0x1470/0x1470 [ 490.440034] ? dquot_get_next_dqblk+0x180/0x180 [ 490.444741] ? selinux_determine_inode_label+0x1b1/0x360 [ 490.450503] ext4_mkdir+0x3d5/0xdf0 [ 490.454174] ? ext4_init_dot_dotdot+0x520/0x520 [ 490.458963] ? selinux_inode_mkdir+0x23/0x30 [ 490.463408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 490.469755] ? security_inode_mkdir+0xe4/0x120 [ 490.474360] vfs_mkdir+0x42e/0x690 [ 490.477948] do_mkdirat+0x234/0x2a0 [ 490.481605] ? __ia32_sys_mknod+0xb0/0xb0 [ 490.485801] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 490.491016] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 490.496401] ? do_syscall_64+0x26/0x620 [ 490.500425] ? lockdep_hardirqs_on+0x415/0x5d0 [ 490.505031] __x64_sys_mkdir+0x5c/0x80 [ 490.510873] do_syscall_64+0xfd/0x620 [ 490.514716] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 490.519920] RIP: 0033:0x459d37 [ 490.523128] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 490.542342] RSP: 002b:00007eff745f6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 490.550177] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 0000000000459d37 [ 490.558085] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 490.565380] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 490.572681] R10: 0000000000000075 R11: 0000000000000246 R12: 00007eff745f76d4 [ 490.580085] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:06 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:06 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x40000}}], 0x8000238, 0x0, 0x0) 16:06:06 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r3 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) 16:06:06 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000000)=@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xfffffeff, 0x0}, 0x4004044) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x82800, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000140)={r5, 0x0, 0x8, r8}) r9 = socket(0x1e, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup3(r11, r10, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$VIDIOC_RESERVED(r12, 0x5601, 0x0) socket$inet(0x2, 0x80000, 0x0) setsockopt$packet_tx_ring(r9, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc, 0x0, 0x0, 0xfffffffd}, 0xffffffffffffff47) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r14, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r15 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r15, r14) r16 = dup3(r13, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) r17 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_LOCK(r17, 0x4008642a, &(0x7f0000000240)={r18, 0x20}) ioctl$DRM_IOCTL_RM_CTX(r16, 0xc0086421, &(0x7f0000000180)={r18, 0x1}) setsockopt$TIPC_IMPORTANCE(r9, 0x10f, 0x7f, &(0x7f0000000080)=0x1, 0x4) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_PDEATHSIG(0x1, 0x1b) delete_module(&(0x7f00000000c0)='posix_acl_access\x00', 0x1800) 16:06:06 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:06:06 executing program 3 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:06 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x400300}}], 0x8000238, 0x0, 0x0) [ 490.896187] FAULT_INJECTION: forcing a failure. [ 490.896187] name failslab, interval 1, probability 0, space 0, times 0 [ 490.950367] CPU: 0 PID: 19240 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 490.958206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 490.967578] Call Trace: [ 490.970192] dump_stack+0x197/0x210 [ 490.973846] should_fail.cold+0xa/0x1b [ 490.977761] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 490.982898] ? lock_downgrade+0x880/0x880 [ 490.987080] __should_failslab+0x121/0x190 [ 490.991596] should_failslab+0x9/0x14 [ 490.995414] kmem_cache_alloc+0x2ae/0x700 [ 491.000014] ? __d_lookup+0x433/0x760 [ 491.003830] ? lookup_dcache+0x23/0x140 [ 491.007813] ? d_lookup+0xf9/0x260 [ 491.011365] ? lockdep_hardirqs_on+0x415/0x5d0 [ 491.016418] __d_alloc+0x2e/0x9c0 [ 491.019897] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 491.024942] d_alloc+0x4d/0x280 [ 491.028243] __lookup_hash+0xcd/0x190 [ 491.032059] filename_create+0x1a7/0x4f0 [ 491.036146] ? kern_path_mountpoint+0x40/0x40 [ 491.040654] ? strncpy_from_user+0x21b/0x2d0 [ 491.045255] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 491.050798] ? getname_flags+0x277/0x5b0 [ 491.054870] do_mkdirat+0xb5/0x2a0 [ 491.058425] ? __ia32_sys_mknod+0xb0/0xb0 [ 491.062642] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 491.067415] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 491.072806] ? do_syscall_64+0x26/0x620 [ 491.076794] ? lockdep_hardirqs_on+0x415/0x5d0 [ 491.081404] __x64_sys_mkdir+0x5c/0x80 [ 491.085305] do_syscall_64+0xfd/0x620 [ 491.089126] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 491.094325] RIP: 0033:0x459d37 [ 491.097528] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 491.116435] RSP: 002b:00007eff745f6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 491.124177] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 0000000000459d37 [ 491.131455] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 491.138739] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a 16:06:06 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r3 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) 16:06:06 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0xa00100}}], 0x8000238, 0x0, 0x0) [ 491.146015] R10: 0000000000000075 R11: 0000000000000246 R12: 00007eff745f76d4 [ 491.153290] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:06 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r1) getsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f0000000400)=[{}, {}], &(0x7f0000000440)=0x10) r3 = socket$kcm(0x2, 0x2, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x800, 0x0) recvfrom$x25(r4, &(0x7f0000000200)=""/237, 0xed, 0x20, &(0x7f0000000300)={0x9, @remote={[], 0x1}}, 0x12) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x3, 0x0) open(&(0x7f0000000340)='./file0\x00', 0x4000, 0x3) ioctl$SIOCX25GCALLUSERDATA(r5, 0x89e4, &(0x7f0000000040)={0x26, "68fd18a0e994fab92302697a201b935340566a4ae7e36b68706b27189a57fb0b26cbfb8297faeff2ee962c171973066795e52d2404017dfaf7dad1e0f20147aff5b72d66db633cb3cb88b9bb4eec48b0d9c91328710031047b401c08a7b59a0aa757ab8968bbeaaab16806c15825b9878e8e9ea95cd24bc7344c6a228d877480"}) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r6, 0x80045006, &(0x7f0000000040)) ioctl$SOUND_PCM_READ_CHANNELS(r6, 0x80045006, &(0x7f0000000100)) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r7, 0x11b, 0x4, &(0x7f0000001580)={&(0x7f0000001480)=""/244, 0xb000, 0x1000, 0x1f, 0xa9ded71d58770964}, 0x20) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r5, 0x84, 0x1c, &(0x7f0000000140), &(0x7f0000000180)=0x4) 16:06:06 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x1000000}}], 0x8000238, 0x0, 0x0) 16:06:06 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r3 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) 16:06:07 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:07 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x2000000}}], 0x8000238, 0x0, 0x0) 16:06:07 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x9, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000400)=""/4096, 0x1000) 16:06:07 executing program 3 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:07 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:07 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 491.849677] FAULT_INJECTION: forcing a failure. [ 491.849677] name failslab, interval 1, probability 0, space 0, times 0 [ 491.909171] CPU: 0 PID: 19274 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 491.917202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.926574] Call Trace: [ 491.929196] dump_stack+0x197/0x210 [ 491.932865] should_fail.cold+0xa/0x1b [ 491.936787] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 491.941913] ? lockdep_hardirqs_on+0x415/0x5d0 [ 491.946624] __should_failslab+0x121/0x190 [ 491.950888] should_failslab+0x9/0x14 [ 491.954720] kmem_cache_alloc+0x2ae/0x700 [ 491.958885] ? map_id_range_down+0x1ee/0x370 [ 491.963315] ? __put_user_ns+0x70/0x70 [ 491.967229] selinux_inode_alloc_security+0xb6/0x2a0 [ 491.972352] security_inode_alloc+0x8a/0xd0 [ 491.976688] inode_init_always+0x56e/0xb40 [ 491.980938] alloc_inode+0x81/0x190 [ 491.986584] new_inode_pseudo+0x19/0xf0 [ 491.990581] new_inode+0x1f/0x40 [ 491.993958] __ext4_new_inode+0x3cb/0x52d0 [ 491.998213] ? kasan_check_read+0x11/0x20 [ 492.002388] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 492.007942] ? ext4_free_inode+0x1470/0x1470 [ 492.012474] ? dquot_get_next_dqblk+0x180/0x180 [ 492.017197] ? selinux_determine_inode_label+0x1b1/0x360 [ 492.022668] ext4_mkdir+0x3d5/0xdf0 [ 492.026326] ? ext4_init_dot_dotdot+0x520/0x520 [ 492.031014] ? selinux_inode_mkdir+0x23/0x30 [ 492.035441] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 492.040990] ? security_inode_mkdir+0xe4/0x120 [ 492.045863] vfs_mkdir+0x42e/0x690 [ 492.049420] do_mkdirat+0x234/0x2a0 [ 492.053065] ? __ia32_sys_mknod+0xb0/0xb0 [ 492.057246] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 492.062020] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 492.067410] ? do_syscall_64+0x26/0x620 [ 492.071407] ? lockdep_hardirqs_on+0x415/0x5d0 [ 492.076006] __x64_sys_mkdir+0x5c/0x80 [ 492.079918] do_syscall_64+0xfd/0x620 [ 492.083738] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 492.088936] RIP: 0033:0x459d37 16:06:07 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x4000000}}], 0x8000238, 0x0, 0x0) [ 492.092140] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 492.111048] RSP: 002b:00007eff745f6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 492.118786] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 0000000000459d37 [ 492.126071] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 492.133370] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 492.140664] R10: 0000000000000075 R11: 0000000000000246 R12: 00007eff745f76d4 [ 492.147956] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:07 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:07 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x42482499}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="5b81002d9cce4a1d1291a822711dce9f2f673b9f2128c8bddabc7f84d178a5791e0d95c4ede7778b23d370291bc80bcbb0e241bf3ee98880b10ba0da63080c11e60cceaabcc5bd82c406651a9bdb0ebe578b00ad605c47c210f365aec6a408777ab756597696675af74cc4901c9f93a6fda205baee6abba88cde079bbd674d727790e4cdbe47c232b921d595be19028f68215a696ee320e85425d90fcfb5f03c95952ce2f8316c95fc86b8551f31742a9876900e98bd943bdfa1f9971adf13181bdd8b3fba59a4771ae4622ef8b5a4086d4f03078bece2418b1a18798b2c29584430b72e37330865963e50", @ANYRES16=r2, @ANYBLOB="000228bd7000fddbdf2502da09000800050003000000000000000000003175fe394958fc04b48a5ecc12"], 0x30}, 0x1, 0x0, 0x0, 0x2}, 0x20000000) socket$kcm(0x2b, 0x1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:06:07 executing program 3 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:07 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x6000000}}], 0x8000238, 0x0, 0x0) 16:06:07 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) [ 492.466848] FAULT_INJECTION: forcing a failure. [ 492.466848] name failslab, interval 1, probability 0, space 0, times 0 [ 492.504988] CPU: 1 PID: 19295 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 492.512845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.522325] Call Trace: [ 492.524978] dump_stack+0x197/0x210 [ 492.528639] should_fail.cold+0xa/0x1b [ 492.532555] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 492.537689] ? lockdep_hardirqs_on+0x415/0x5d0 [ 492.542315] __should_failslab+0x121/0x190 [ 492.546577] should_failslab+0x9/0x14 [ 492.550401] kmem_cache_alloc+0x2ae/0x700 [ 492.554566] ? map_id_range_down+0x1ee/0x370 [ 492.558999] ? __put_user_ns+0x70/0x70 [ 492.563263] selinux_inode_alloc_security+0xb6/0x2a0 [ 492.568387] security_inode_alloc+0x8a/0xd0 [ 492.572808] inode_init_always+0x56e/0xb40 [ 492.577037] alloc_inode+0x81/0x190 [ 492.580664] new_inode_pseudo+0x19/0xf0 [ 492.584629] new_inode+0x1f/0x40 [ 492.587987] __ext4_new_inode+0x3cb/0x52d0 [ 492.592745] ? kasan_check_read+0x11/0x20 [ 492.596900] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 492.602457] ? ext4_free_inode+0x1470/0x1470 [ 492.606872] ? dquot_get_next_dqblk+0x180/0x180 [ 492.611550] ? selinux_determine_inode_label+0x1b1/0x360 [ 492.616997] ext4_mkdir+0x3d5/0xdf0 [ 492.620623] ? ext4_init_dot_dotdot+0x520/0x520 [ 492.625292] ? selinux_inode_mkdir+0x23/0x30 [ 492.630913] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 492.636461] ? security_inode_mkdir+0xe4/0x120 [ 492.641048] vfs_mkdir+0x42e/0x690 [ 492.644592] do_mkdirat+0x234/0x2a0 [ 492.648213] ? __ia32_sys_mknod+0xb0/0xb0 [ 492.652351] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 492.657102] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 492.662467] ? do_syscall_64+0x26/0x620 [ 492.666458] ? lockdep_hardirqs_on+0x415/0x5d0 [ 492.671296] __x64_sys_mkdir+0x5c/0x80 [ 492.675179] do_syscall_64+0xfd/0x620 [ 492.678981] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 492.684161] RIP: 0033:0x459d37 [ 492.687347] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 492.706366] RSP: 002b:00007eff745f6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 492.714178] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 0000000000459d37 [ 492.721571] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 492.728875] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 492.736159] R10: 0000000000000075 R11: 0000000000000246 R12: 00007eff745f76d4 [ 492.743431] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:08 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x7000000}}], 0x8000238, 0x0, 0x0) 16:06:08 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x64, 0x0}, 0x40c0) 16:06:08 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x530e000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:08 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:08 executing program 3 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:08 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x530e000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 493.158872] FAULT_INJECTION: forcing a failure. [ 493.158872] name failslab, interval 1, probability 0, space 0, times 0 [ 493.182875] CPU: 0 PID: 19317 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 493.190725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 493.200093] Call Trace: [ 493.202707] dump_stack+0x197/0x210 16:06:08 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:08 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x8000000}}], 0x8000238, 0x0, 0x0) [ 493.206354] should_fail.cold+0xa/0x1b [ 493.210264] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 493.215396] ? ext4_es_find_delayed_extent_range+0xa30/0xa30 [ 493.221235] __should_failslab+0x121/0x190 [ 493.225536] should_failslab+0x9/0x14 [ 493.229357] __kmalloc+0x2e2/0x750 [ 493.232949] ? ext4_find_extent+0x76e/0x9d0 [ 493.237310] ext4_find_extent+0x76e/0x9d0 [ 493.241505] ext4_ext_map_blocks+0x1c3/0x55c0 [ 493.246041] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 493.251088] ? __lock_is_held+0xb6/0x140 [ 493.255186] ? lock_acquire+0x16f/0x3f0 [ 493.259179] ? ext4_map_blocks+0x928/0x1b20 [ 493.263532] ext4_map_blocks+0x990/0x1b20 [ 493.267709] ? ext4_issue_zeroout+0x170/0x170 [ 493.272236] ? kasan_check_write+0x14/0x20 [ 493.276493] ? __brelse+0x95/0xb0 [ 493.279967] ext4_getblk+0xc4/0x510 [ 493.283642] ? ext4_iomap_begin+0xfd0/0xfd0 [ 493.288074] ? ext4_free_inode+0x1470/0x1470 [ 493.292517] ext4_bread+0x8f/0x230 [ 493.296073] ? ext4_getblk+0x510/0x510 [ 493.299979] ext4_append+0x155/0x370 [ 493.303716] ext4_mkdir+0x61b/0xdf0 [ 493.307367] ? ext4_init_dot_dotdot+0x520/0x520 [ 493.312056] ? selinux_inode_mkdir+0x23/0x30 [ 493.316490] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 493.322039] ? security_inode_mkdir+0xe4/0x120 [ 493.326644] vfs_mkdir+0x42e/0x690 [ 493.330203] do_mkdirat+0x234/0x2a0 [ 493.333847] ? __ia32_sys_mknod+0xb0/0xb0 [ 493.338009] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 493.342778] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 493.348152] ? do_syscall_64+0x26/0x620 [ 493.352139] ? lockdep_hardirqs_on+0x415/0x5d0 [ 493.356740] __x64_sys_mkdir+0x5c/0x80 [ 493.360641] do_syscall_64+0xfd/0x620 [ 493.364488] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 493.369688] RIP: 0033:0x459d37 [ 493.372894] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 493.391817] RSP: 002b:00007eff745f6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 493.399547] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 0000000000459d37 16:06:08 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r3 = socket(0x1e, 0x4, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000400)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r4 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r4, r3) accept4$inet6(r3, &(0x7f0000000240), &(0x7f0000000340)=0x1c, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xa01889c3dcdc38d1}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="34000000190000022bbd7000fcdbdf258000830200048f069154914189cf9300a097f7d066e4f917006a000008001900", @ANYRES32=r5], 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000050) r6 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r6, 0x10e, 0x2, &(0x7f0000000040)=0x13, 0x4) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) [ 493.406829] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 493.414112] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 493.421402] R10: 0000000000000075 R11: 0000000000000246 R12: 00007eff745f76d4 [ 493.428690] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:09 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x9000000}}], 0x8000238, 0x0, 0x0) 16:06:09 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:09 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, 0x0) r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:09 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@nl=@kern={0x10, 0x0, 0x0, 0x38bceeed0166a3b6}, 0x80, 0x0, 0x0, 0x0, 0x266}, 0x4) r2 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000000)=0x1000000, 0x4) 16:06:09 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0xa000000}}], 0x8000238, 0x0, 0x0) 16:06:09 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:09 executing program 3 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:09 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0xc000000}}], 0x8000238, 0x0, 0x0) 16:06:09 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_smack_transmute(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x2) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000240)="dc1739f7030605a205978431f64408e8cec00ea25d1663af4d0662f8940d80ff7800e0ecd0f69ef68955bbc257f3b7fb39ef7183d9765a4d109851ab7771068f43e7af19f3028a9abd9802c1ece5230616145f9e1c05cb91e5b6924fe3") r1 = socket$kcm(0x2, 0x2, 0x0) socket$inet(0x2, 0x1, 0x7) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r2) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f0000000180)={'HL\x00'}, &(0x7f00000001c0)=0xfffffd3d) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$USBDEVFS_REAPURBNDELAY(r6, 0x4008550d, &(0x7f0000000080)) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:06:09 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x6000000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:06:09 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, 0x0) r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) [ 494.472424] FAULT_INJECTION: forcing a failure. [ 494.472424] name failslab, interval 1, probability 0, space 0, times 0 [ 494.503421] CPU: 1 PID: 19350 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 494.511277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 494.520646] Call Trace: [ 494.523255] dump_stack+0x197/0x210 [ 494.526904] should_fail.cold+0xa/0x1b [ 494.530816] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 494.536817] ? ext4_es_find_delayed_extent_range+0xa30/0xa30 [ 494.542652] __should_failslab+0x121/0x190 [ 494.546901] should_failslab+0x9/0x14 [ 494.550713] __kmalloc+0x2e2/0x750 [ 494.554276] ? ext4_find_extent+0x76e/0x9d0 [ 494.558617] ext4_find_extent+0x76e/0x9d0 [ 494.562800] ext4_ext_map_blocks+0x1c3/0x55c0 [ 494.567330] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 494.572370] ? __lock_is_held+0xb6/0x140 [ 494.576462] ? lock_acquire+0x16f/0x3f0 [ 494.580459] ? ext4_map_blocks+0x928/0x1b20 [ 494.584813] ext4_map_blocks+0x990/0x1b20 [ 494.588996] ? ext4_issue_zeroout+0x170/0x170 [ 494.593516] ? kasan_check_write+0x14/0x20 [ 494.597777] ? __brelse+0x95/0xb0 [ 494.601255] ext4_getblk+0xc4/0x510 [ 494.604898] ? ext4_iomap_begin+0xfd0/0xfd0 [ 494.609233] ? ext4_free_inode+0x1470/0x1470 [ 494.613659] ext4_bread+0x8f/0x230 [ 494.617212] ? ext4_getblk+0x510/0x510 [ 494.621106] ext4_append+0x155/0x370 [ 494.624816] ext4_mkdir+0x61b/0xdf0 [ 494.628453] ? ext4_init_dot_dotdot+0x520/0x520 [ 494.633121] ? selinux_inode_mkdir+0x23/0x30 [ 494.637534] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 494.643064] ? security_inode_mkdir+0xe4/0x120 [ 494.647660] vfs_mkdir+0x42e/0x690 [ 494.651205] do_mkdirat+0x234/0x2a0 [ 494.654828] ? __ia32_sys_mknod+0xb0/0xb0 [ 494.658969] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 494.663720] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 494.669071] ? do_syscall_64+0x26/0x620 [ 494.673045] ? lockdep_hardirqs_on+0x415/0x5d0 [ 494.677633] __x64_sys_mkdir+0x5c/0x80 [ 494.681514] do_syscall_64+0xfd/0x620 [ 494.685306] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 494.690492] RIP: 0033:0x459d37 [ 494.693676] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 494.712586] RSP: 002b:00007eff745f6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 494.720291] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 0000000000459d37 [ 494.727557] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 494.734812] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 494.742075] R10: 0000000000000075 R11: 0000000000000246 R12: 00007eff745f76d4 [ 494.749351] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:10 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0xe000000}}], 0x8000238, 0x0, 0x0) 16:06:10 executing program 3 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:10 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x10000000}}], 0x8000238, 0x0, 0x0) 16:06:10 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x14000000}}], 0x8000238, 0x0, 0x0) 16:06:10 executing program 1: seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) utimensat(r2, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KDFONTOP_SET(r5, 0x4b72, &(0x7f0000000240)={0x0, 0x1, 0x14, 0x14, 0xc2, &(0x7f0000000400)="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"}) r6 = socket$kcm(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r6, 0xffffffffffffffff) r9 = dup3(r8, r7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$UFFDIO_UNREGISTER(r9, 0x8010aa01, &(0x7f0000000280)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r10 = socket$kcm(0x2, 0x2, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0x43e5) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) socket$unix(0x1, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000200)={'veth0_to_bridge\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x24}}}) r12 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r12, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) setsockopt$bt_BT_SNDMTU(r12, 0x112, 0xc, &(0x7f00000002c0)=0x8, 0x2) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000080)={0x1, 0xf, 0x4, 0x0, 0xc4ba, {0x77359400}, {0x4, 0x2, 0x21, 0x5, 0x1f, 0x7f, "e9ca6a5c"}, 0x20, 0x0, @userptr=0x10001, 0x6, 0x0, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r13, 0x40bc5311, &(0x7f0000000100)={0x6f, 0xfdd0b5d744d3daea, 'client1\x00', 0x3, "676eae9ec70300f9", "71aaeff838573ec11aa16e2f09d850316c57eda645e547d79420675425873717", 0x1, 0x20271e}) ioctl$KDGKBMETA(r11, 0x4b62, &(0x7f0000000040)) r14 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000800)={&(0x7f0000000340)='./file0\x00', 0x0, 0x10}, 0x10) ioctl(r14, 0x3f, &(0x7f0000000840)="8ad107a4abd5640bee993ed2b5bf0d2fe77f59f472eb0e4003afc3b112af23bc69e55e49036fbb31836383ba7897bc147ca7d6e6c9507879578eb29d295a10815be389089e5d636e475bc8acbbd7b2840d31ba661a2e1143c5b9ec4a64ec3a73e1") sendmsg$kcm(r10, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) [ 495.270445] audit: type=1326 audit(1577117170.745:83): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=19379 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45d75a code=0x0 16:06:10 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, 0x0) r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) [ 495.590156] FAULT_INJECTION: forcing a failure. [ 495.590156] name failslab, interval 1, probability 0, space 0, times 0 [ 495.608661] CPU: 0 PID: 19378 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 495.616593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.625961] Call Trace: [ 495.628567] dump_stack+0x197/0x210 [ 495.632221] should_fail.cold+0xa/0x1b [ 495.636130] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 495.641285] ? ext4_es_find_delayed_extent_range+0xa30/0xa30 [ 495.647112] __should_failslab+0x121/0x190 [ 495.651376] should_failslab+0x9/0x14 [ 495.655214] __kmalloc+0x2e2/0x750 [ 495.658784] ? ext4_find_extent+0x76e/0x9d0 [ 495.663125] ext4_find_extent+0x76e/0x9d0 [ 495.667302] ext4_ext_map_blocks+0x1c3/0x55c0 [ 495.671834] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 495.676869] ? __lock_is_held+0xb6/0x140 [ 495.680955] ? lock_acquire+0x16f/0x3f0 [ 495.684944] ? ext4_map_blocks+0x928/0x1b20 [ 495.689290] ext4_map_blocks+0x990/0x1b20 [ 495.693465] ? ext4_issue_zeroout+0x170/0x170 [ 495.697980] ? kasan_check_write+0x14/0x20 [ 495.702244] ? __brelse+0x95/0xb0 [ 495.705733] ext4_getblk+0xc4/0x510 [ 495.709392] ? ext4_iomap_begin+0xfd0/0xfd0 [ 495.713749] ? ext4_free_inode+0x1470/0x1470 [ 495.718193] ext4_bread+0x8f/0x230 [ 495.721754] ? ext4_getblk+0x510/0x510 [ 495.725676] ext4_append+0x155/0x370 [ 495.729408] ext4_mkdir+0x61b/0xdf0 [ 495.733076] ? ext4_init_dot_dotdot+0x520/0x520 [ 495.737775] ? selinux_inode_mkdir+0x23/0x30 [ 495.742211] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 495.748371] ? security_inode_mkdir+0xe4/0x120 [ 495.752975] vfs_mkdir+0x42e/0x690 [ 495.756533] do_mkdirat+0x234/0x2a0 [ 495.760176] ? __ia32_sys_mknod+0xb0/0xb0 [ 495.764348] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 495.769126] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 495.774501] ? do_syscall_64+0x26/0x620 [ 495.778823] ? lockdep_hardirqs_on+0x415/0x5d0 [ 495.783419] __x64_sys_mkdir+0x5c/0x80 [ 495.787325] do_syscall_64+0xfd/0x620 [ 495.791141] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 495.796344] RIP: 0033:0x459d37 [ 495.799555] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 495.818467] RSP: 002b:00007eff745f6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 495.826201] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 0000000000459d37 [ 495.833503] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 16:06:11 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:11 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:06:11 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x38100000}}], 0x8000238, 0x0, 0x0) [ 495.840797] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 495.848081] R10: 0000000000000075 R11: 0000000000000246 R12: 00007eff745f76d4 [ 495.855363] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:11 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x3f000000}}], 0x8000238, 0x0, 0x0) 16:06:11 executing program 3 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:11 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(0x0, 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) [ 496.066518] audit: type=1326 audit(1577117171.545:84): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=19379 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45d75a code=0x0 [ 496.140320] FAULT_INJECTION: forcing a failure. [ 496.140320] name failslab, interval 1, probability 0, space 0, times 0 [ 496.152288] CPU: 0 PID: 19404 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 496.160108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 496.169508] Call Trace: [ 496.172119] dump_stack+0x197/0x210 [ 496.175789] should_fail.cold+0xa/0x1b [ 496.179701] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 496.184820] ? save_stack+0xa9/0xd0 [ 496.188461] ? __es_tree_search.isra.0+0x1bf/0x230 [ 496.193401] ? save_stack+0x45/0xd0 [ 496.197051] __should_failslab+0x121/0x190 [ 496.201298] should_failslab+0x9/0x14 [ 496.205111] kmem_cache_alloc+0x47/0x700 [ 496.209195] ? ext4_es_scan+0x730/0x730 [ 496.213192] __es_insert_extent+0x2cc/0xf20 [ 496.217525] ? do_raw_write_lock+0xbd/0x1e0 [ 496.221865] ext4_es_insert_extent+0x27e/0x640 [ 496.226467] ? ext4_es_find_delayed_extent_range+0xa30/0xa30 [ 496.232386] ? rcu_read_lock_sched_held+0x110/0x130 [ 496.237422] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 496.242990] ? ext4_es_find_delayed_extent_range+0x387/0xa30 [ 496.248969] ext4_ext_put_gap_in_cache+0xf7/0x150 [ 496.253830] ? ext4_zeroout_es+0x180/0x180 [ 496.258112] ? ext4_find_extent+0x76e/0x9d0 [ 496.262453] ? ext4_find_extent+0x6a6/0x9d0 [ 496.266799] ext4_ext_map_blocks+0x204c/0x55c0 [ 496.271406] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 496.276528] ? __lock_is_held+0xb6/0x140 [ 496.280617] ? lock_acquire+0x16f/0x3f0 [ 496.284603] ? ext4_map_blocks+0x4cf/0x1b20 [ 496.288948] ext4_map_blocks+0xf83/0x1b20 [ 496.293116] ? ext4_issue_zeroout+0x170/0x170 [ 496.297631] ? kasan_check_write+0x14/0x20 [ 496.301886] ? __brelse+0x95/0xb0 [ 496.305356] ext4_getblk+0xc4/0x510 [ 496.308999] ? ext4_iomap_begin+0xfd0/0xfd0 [ 496.313337] ? ext4_free_inode+0x1470/0x1470 [ 496.317782] ext4_bread+0x8f/0x230 [ 496.321333] ? ext4_getblk+0x510/0x510 [ 496.325238] ext4_append+0x155/0x370 [ 496.328971] ext4_mkdir+0x61b/0xdf0 [ 496.332617] ? ext4_init_dot_dotdot+0x520/0x520 [ 496.337305] ? selinux_inode_mkdir+0x23/0x30 [ 496.341726] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 496.347283] ? security_inode_mkdir+0xe4/0x120 [ 496.351882] vfs_mkdir+0x42e/0x690 [ 496.355441] do_mkdirat+0x234/0x2a0 [ 496.359083] ? __ia32_sys_mknod+0xb0/0xb0 [ 496.363240] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 496.368013] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 496.373389] ? do_syscall_64+0x26/0x620 [ 496.378430] ? lockdep_hardirqs_on+0x415/0x5d0 [ 496.383027] __x64_sys_mkdir+0x5c/0x80 [ 496.386976] do_syscall_64+0xfd/0x620 [ 496.390834] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 496.396030] RIP: 0033:0x459d37 [ 496.399242] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 496.418155] RSP: 002b:00007eff745f6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 496.425880] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 0000000000459d37 [ 496.433157] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 16:06:11 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x40000000}}], 0x8000238, 0x0, 0x0) [ 496.440436] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 496.447737] R10: 0000000000000075 R11: 0000000000000246 R12: 00007eff745f76d4 [ 496.455034] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:12 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(0x0, 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:12 executing program 3 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:12 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x4) write$FUSE_BMAP(r1, &(0x7f0000000080)={0x18, 0xffffffffffffffda, 0x6, {0x8}}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r6 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r6, r5) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r6) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r7 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r7, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r8 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r8, r7) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x1, 0x1, 0xfff, 0x4, 0xb6, 0x4}, 0x1c) r9 = socket$kcm(0x2, 0x2, 0x0) r10 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r10, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r11 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r11, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r12 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r12, r11) r13 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r12, 0x0) dup2(r13, r10) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205648, &(0x7f00000016c0)={0x0, 0x194b, 0x8, r10, 0x0, &(0x7f0000001680)={0x990966, 0x0, [], @p_u16=&(0x7f0000001640)=0x5}}) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r14, 0x84, 0xc, &(0x7f0000001700), &(0x7f0000001740)=0x4) sendmsg$kcm(r9, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:06:12 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x50100000}}], 0x8000238, 0x0, 0x0) 16:06:12 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(0x0, 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) [ 496.884575] FAULT_INJECTION: forcing a failure. [ 496.884575] name failslab, interval 1, probability 0, space 0, times 0 [ 496.895986] CPU: 1 PID: 19419 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 496.903810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 496.913185] Call Trace: [ 496.915798] dump_stack+0x197/0x210 [ 496.919459] should_fail.cold+0xa/0x1b [ 496.923377] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 496.928506] ? mark_held_locks+0xb1/0x100 [ 496.932678] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 496.937719] ? __es_tree_search.isra.0+0x1bf/0x230 [ 496.942677] __should_failslab+0x121/0x190 [ 496.946937] should_failslab+0x9/0x14 [ 496.950763] kmem_cache_alloc+0x47/0x700 [ 496.954844] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 496.959880] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 496.964713] ? ext4_es_scan+0x730/0x730 [ 496.968717] __es_insert_extent+0x2cc/0xf20 [ 496.973062] ? do_raw_write_lock+0xbd/0x1e0 [ 496.977418] ext4_es_insert_extent+0x27e/0x640 [ 496.982038] ? ext4_es_find_delayed_extent_range+0xa30/0xa30 [ 496.987906] ext4_map_blocks+0xc3f/0x1b20 [ 496.992089] ? ext4_issue_zeroout+0x170/0x170 [ 496.996611] ? kasan_check_write+0x14/0x20 [ 497.000866] ? __brelse+0x95/0xb0 [ 497.004338] ext4_getblk+0xc4/0x510 [ 497.007988] ? ext4_iomap_begin+0xfd0/0xfd0 [ 497.012352] ? ext4_free_inode+0x1470/0x1470 [ 497.016786] ext4_bread+0x8f/0x230 [ 497.020355] ? ext4_getblk+0x510/0x510 [ 497.024273] ext4_append+0x155/0x370 [ 497.028011] ext4_mkdir+0x61b/0xdf0 16:06:12 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:12 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 497.031669] ? ext4_init_dot_dotdot+0x520/0x520 [ 497.037318] ? selinux_inode_mkdir+0x23/0x30 [ 497.041750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 497.047313] ? security_inode_mkdir+0xe4/0x120 [ 497.051932] vfs_mkdir+0x42e/0x690 [ 497.055497] do_mkdirat+0x234/0x2a0 [ 497.059153] ? __ia32_sys_mknod+0xb0/0xb0 [ 497.063328] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 497.068207] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 497.073595] ? do_syscall_64+0x26/0x620 [ 497.077598] ? lockdep_hardirqs_on+0x415/0x5d0 [ 497.082205] __x64_sys_mkdir+0x5c/0x80 [ 497.086116] do_syscall_64+0xfd/0x620 [ 497.089940] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 497.095154] RIP: 0033:0x459d37 [ 497.098367] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 497.117285] RSP: 002b:00007eff745f6a68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 497.125036] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 0000000000459d37 [ 497.132323] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 497.139615] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 497.146900] R10: 0000000000000075 R11: 0000000000000246 R12: 00007eff745f76d4 [ 497.154187] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:12 executing program 3 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 497.449737] FAULT_INJECTION: forcing a failure. [ 497.449737] name failslab, interval 1, probability 0, space 0, times 0 [ 497.461457] CPU: 1 PID: 19440 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 497.469722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 497.479098] Call Trace: [ 497.481720] dump_stack+0x197/0x210 [ 497.485379] should_fail.cold+0xa/0x1b [ 497.489305] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 497.494433] ? __sigqueue_alloc+0x176/0x4e0 [ 497.498901] ? find_held_lock+0x35/0x130 [ 497.503155] __should_failslab+0x121/0x190 [ 497.507425] should_failslab+0x9/0x14 [ 497.511245] kmem_cache_alloc+0x47/0x700 [ 497.515475] ? kasan_check_read+0x11/0x20 [ 497.519656] __sigqueue_alloc+0x26b/0x4e0 [ 497.523832] __send_signal+0x20f/0x14a0 [ 497.527831] ? lock_acquire+0x16f/0x3f0 [ 497.531837] send_signal+0x49/0xd0 [ 497.535400] force_sig_info+0x251/0x310 [ 497.539405] force_sig_info_fault.constprop.0+0x215/0x360 [ 497.544966] ? is_prefetch.isra.0+0x470/0x470 [ 497.549487] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 497.555083] ? trace_hardirqs_on+0x67/0x220 [ 497.559440] __bad_area_nosemaphore+0x2db/0x3f0 [ 497.564172] ? vmacache_find+0x65/0x310 [ 497.568182] bad_area+0x69/0x80 [ 497.571500] __do_page_fault+0xae1/0xe90 [ 497.575671] ? do_mkdirat+0x1a2/0x2a0 [ 497.579625] ? vmalloc_fault+0x740/0x740 [ 497.583714] ? trace_hardirqs_off_caller+0x65/0x220 [ 497.588886] ? trace_hardirqs_on_caller+0x6a/0x220 [ 497.593855] ? page_fault+0x8/0x30 [ 497.597430] do_page_fault+0x71/0x57d [ 497.601261] ? page_fault+0x8/0x30 [ 497.604822] page_fault+0x1e/0x30 [ 497.608292] RIP: 0033:0x45451f [ 497.611498] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 497.630426] RSP: 002b:00007eff745f6a68 EFLAGS: 00010283 [ 497.635813] RAX: 00007eff745f6b40 RBX: 00007eff745f6c90 RCX: 0000000000000000 [ 497.643107] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007eff745f6b40 [ 497.650402] RBP: 000000000075bf20 R08: 00000000000000e0 R09: 000000000000000a [ 497.657697] R10: 0000000000000075 R11: 00000000004ea000 R12: 00007eff745f76d4 [ 497.664988] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:13 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:13 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x60000000}}], 0x8000238, 0x0, 0x0) 16:06:13 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) r2 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) connect$pptp(r2, &(0x7f00000000c0)={0x18, 0x2, {0x0, @broadcast}}, 0x1e) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) r3 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) r4 = socket$xdp(0x2c, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup3(r9, r8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$TIOCVHANGUP(r10, 0x5437, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_S_EXT_CTRLS(r7, 0xc0205648, &(0x7f0000000140)={0x980000, 0x4, 0x96, 0xffffffffffffffff, 0x0, &(0x7f0000000100)={0xa10902, 0x4, [], @value=0x3f}}) ioctl$VIDIOC_SUBDEV_S_CROP(r11, 0xc038563c, &(0x7f0000000180)={0x0, 0x0, {0x6, 0x9, 0x3, 0x4}}) splice(r3, &(0x7f0000000000)=0x3, r4, &(0x7f0000000040)=0x723, 0x7fffffff, 0x2) 16:06:13 executing program 3 (fault-call:0 fault-nth:38): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 498.065244] FAULT_INJECTION: forcing a failure. [ 498.065244] name failslab, interval 1, probability 0, space 0, times 0 [ 498.076504] CPU: 0 PID: 19456 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 498.084314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 498.093690] Call Trace: [ 498.096303] dump_stack+0x197/0x210 [ 498.099958] should_fail.cold+0xa/0x1b [ 498.103869] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 498.108997] ? __sigqueue_alloc+0x176/0x4e0 [ 498.113351] ? find_held_lock+0x35/0x130 [ 498.117445] __should_failslab+0x121/0x190 [ 498.121706] should_failslab+0x9/0x14 [ 498.125532] kmem_cache_alloc+0x47/0x700 [ 498.129659] ? kasan_check_read+0x11/0x20 [ 498.133860] __sigqueue_alloc+0x26b/0x4e0 [ 498.138035] __send_signal+0x20f/0x14a0 [ 498.142039] ? lock_acquire+0x16f/0x3f0 [ 498.146040] send_signal+0x49/0xd0 [ 498.149599] force_sig_info+0x251/0x310 [ 498.153601] force_sig_info_fault.constprop.0+0x215/0x360 [ 498.159167] ? is_prefetch.isra.0+0x470/0x470 [ 498.163675] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 498.169243] ? trace_hardirqs_on+0x67/0x220 [ 498.173591] __bad_area_nosemaphore+0x2db/0x3f0 [ 498.178279] ? vmacache_find+0x65/0x310 [ 498.182277] bad_area+0x69/0x80 [ 498.185581] __do_page_fault+0xae1/0xe90 [ 498.189655] ? do_mkdirat+0x1a2/0x2a0 [ 498.193479] ? vmalloc_fault+0x740/0x740 [ 498.197595] ? trace_hardirqs_off_caller+0x65/0x220 [ 498.202628] ? trace_hardirqs_on_caller+0x6a/0x220 [ 498.207573] ? page_fault+0x8/0x30 [ 498.211133] do_page_fault+0x71/0x57d [ 498.214950] ? page_fault+0x8/0x30 [ 498.218506] page_fault+0x1e/0x30 [ 498.221969] RIP: 0033:0x45451f [ 498.225173] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 498.244108] RSP: 002b:00007eff745f6a68 EFLAGS: 00010283 [ 498.249501] RAX: 00007eff745f6b40 RBX: 00007eff745f6c90 RCX: 0000000000000000 [ 498.256790] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007eff745f6b40 16:06:13 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 498.264082] RBP: 000000000075bf20 R08: 00000000000000e0 R09: 000000000000000a [ 498.271366] R10: 0000000000000075 R11: 00000000004ea000 R12: 00007eff745f76d4 [ 498.278650] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:13 executing program 3 (fault-call:0 fault-nth:39): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:13 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x65580000}}], 0x8000238, 0x0, 0x0) 16:06:13 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:13 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x2, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r1) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000380)=@in={0x2, 0x4e23, @remote}, 0x361, 0x0, 0x0, 0x0, 0xffffffffffffff55}, 0x0) 16:06:14 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) [ 498.569352] FAULT_INJECTION: forcing a failure. [ 498.569352] name failslab, interval 1, probability 0, space 0, times 0 [ 498.597692] CPU: 1 PID: 19469 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 498.606068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 498.615440] Call Trace: [ 498.618066] dump_stack+0x197/0x210 [ 498.621915] should_fail.cold+0xa/0x1b [ 498.625841] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 498.630973] ? lock_downgrade+0x880/0x880 [ 498.635161] __should_failslab+0x121/0x190 [ 498.639422] should_failslab+0x9/0x14 [ 498.643261] __kmalloc_track_caller+0x2de/0x750 [ 498.647982] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 498.653542] ? strndup_user+0x77/0xd0 [ 498.657367] memdup_user+0x26/0xb0 [ 498.660941] strndup_user+0x77/0xd0 [ 498.664584] ksys_mount+0x7b/0x150 [ 498.668158] __x64_sys_mount+0xbe/0x150 [ 498.672165] do_syscall_64+0xfd/0x620 [ 498.676021] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 498.681239] RIP: 0033:0x45d36a [ 498.684447] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 498.703457] RSP: 002b:00007eff745f6a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 498.711308] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045d36a [ 498.718604] RDX: 00007eff745f6ae0 RSI: 00000000200001c0 RDI: 00007eff745f6b00 [ 498.726025] RBP: 000000000075bf20 R08: 00007eff745f6b40 R09: 00007eff745f6ae0 [ 498.733323] R10: 0000000000000000 R11: 0000000000000202 R12: 00007eff745f76d4 [ 498.740617] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:14 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x74100000}}], 0x8000238, 0x0, 0x0) 16:06:14 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:14 executing program 3 (fault-call:0 fault-nth:40): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 499.040373] FAULT_INJECTION: forcing a failure. [ 499.040373] name failslab, interval 1, probability 0, space 0, times 0 [ 499.074609] CPU: 0 PID: 19486 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 499.082469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 499.092799] Call Trace: [ 499.095412] dump_stack+0x197/0x210 [ 499.099070] should_fail.cold+0xa/0x1b [ 499.102984] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 499.108121] ? lock_downgrade+0x880/0x880 [ 499.112304] __should_failslab+0x121/0x190 [ 499.116587] should_failslab+0x9/0x14 [ 499.120408] kmem_cache_alloc_trace+0x2cc/0x760 [ 499.125118] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 499.130671] ? _copy_from_user+0xdd/0x150 [ 499.134834] copy_mount_options+0x5c/0x3a0 [ 499.139082] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 499.144630] ksys_mount+0xa7/0x150 [ 499.148183] __x64_sys_mount+0xbe/0x150 [ 499.152188] do_syscall_64+0xfd/0x620 [ 499.156018] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 499.161215] RIP: 0033:0x45d36a [ 499.164429] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 499.183392] RSP: 002b:00007eff745f6a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 16:06:14 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f00000001c0), &(0x7f0000000240)=0x8) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x202000, 0x18d) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r5, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000200)=0x98) r6 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r6, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r7 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r7, r6) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r6, 0x84, 0x5, &(0x7f0000002c00)={r5, @in6={{0xa, 0x4e22, 0x1fc, @loopback}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000280)={r5, @in6={{0xa, 0x0, 0x1, @local, 0xbc5}}, 0x0, 0x3f, 0x0, 0xff, 0xf4ade3832108ff31}, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000040)={0x0, 0xfffffffc}, &(0x7f0000000080)=0xfffffffffffffdc5) [ 499.191125] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045d36a [ 499.198428] RDX: 00007eff745f6ae0 RSI: 00000000200001c0 RDI: 00007eff745f6b00 [ 499.205726] RBP: 000000000075bf20 R08: 00007eff745f6b40 R09: 00007eff745f6ae0 [ 499.213019] R10: 0000000000000000 R11: 0000000000000202 R12: 00007eff745f76d4 [ 499.220310] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:14 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:06:14 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:15 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x81000000}}], 0x8000238, 0x0, 0x0) 16:06:15 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) r5 = accept$inet(r2, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000100)={r6, @in6={{0xa, 0x4e20, 0x7, @mcast1, 0x1}}}, 0x84) ioctl$KVM_GET_DIRTY_LOG(r4, 0x4010ae42, &(0x7f00000001c0)={0x2, 0x0, &(0x7f0000ffd000/0x2000)=nil}) 16:06:15 executing program 3 (fault-call:0 fault-nth:41): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:15 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) [ 499.734778] FAULT_INJECTION: forcing a failure. [ 499.734778] name failslab, interval 1, probability 0, space 0, times 0 [ 499.795054] CPU: 1 PID: 19509 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 499.802916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 499.812506] Call Trace: [ 499.815307] dump_stack+0x197/0x210 [ 499.818967] should_fail.cold+0xa/0x1b [ 499.822881] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 499.828011] ? lock_downgrade+0x880/0x880 [ 499.832189] __should_failslab+0x121/0x190 [ 499.836453] should_failslab+0x9/0x14 [ 499.840271] kmem_cache_alloc+0x2ae/0x700 [ 499.844451] ? __schedule+0x86e/0x1dc0 [ 499.848351] ? find_held_lock+0x35/0x130 [ 499.852430] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 499.857200] getname_flags+0xd6/0x5b0 [ 499.861016] user_path_at_empty+0x2f/0x50 [ 499.865177] do_mount+0x150/0x2bc0 [ 499.868730] ? retint_kernel+0x2d/0x2d [ 499.872631] ? copy_mount_string+0x40/0x40 [ 499.876881] ? copy_mount_options+0x1f8/0x3a0 [ 499.881389] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 499.887075] ? copy_mount_options+0x280/0x3a0 [ 499.891606] ksys_mount+0xdb/0x150 [ 499.895166] __x64_sys_mount+0xbe/0x150 [ 499.899160] do_syscall_64+0xfd/0x620 [ 499.902982] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 499.908179] RIP: 0033:0x45d36a [ 499.911385] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 499.930297] RSP: 002b:00007eff745f6a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 499.938026] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045d36a [ 499.945310] RDX: 00007eff745f6ae0 RSI: 00000000200001c0 RDI: 00007eff745f6b00 [ 499.952682] RBP: 000000000075bf20 R08: 00007eff745f6b40 R09: 00007eff745f6ae0 [ 499.959982] R10: 0000000000000000 R11: 0000000000000202 R12: 00007eff745f76d4 [ 499.967268] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:15 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0x88a8ffff}}], 0x8000238, 0x0, 0x0) 16:06:15 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:15 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) r2 = accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000040)=0x1c) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x40, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x79170805) r4 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x1, 0x4080) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r4, 0x4) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:06:15 executing program 3 (fault-call:0 fault-nth:42): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 500.359561] FAULT_INJECTION: forcing a failure. [ 500.359561] name failslab, interval 1, probability 0, space 0, times 0 [ 500.392430] CPU: 0 PID: 19525 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 500.400293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 500.409669] Call Trace: [ 500.412281] dump_stack+0x197/0x210 [ 500.415947] should_fail.cold+0xa/0x1b [ 500.419877] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 500.425014] ? lock_downgrade+0x880/0x880 [ 500.429234] __should_failslab+0x121/0x190 [ 500.433491] should_failslab+0x9/0x14 [ 500.437312] __kmalloc_track_caller+0x2de/0x750 [ 500.442187] ? kstrdup_const+0x66/0x80 [ 500.446100] kstrdup+0x3a/0x70 [ 500.449311] kstrdup_const+0x66/0x80 [ 500.453041] alloc_vfsmnt+0xba/0x780 [ 500.456779] vfs_kern_mount.part.0+0x2a/0x410 [ 500.461296] do_mount+0x53e/0x2bc0 [ 500.464865] ? copy_mount_string+0x40/0x40 [ 500.469126] ? _copy_from_user+0xdd/0x150 [ 500.473439] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 500.479024] ? copy_mount_options+0x280/0x3a0 [ 500.483546] ksys_mount+0xdb/0x150 [ 500.487104] __x64_sys_mount+0xbe/0x150 [ 500.491098] do_syscall_64+0xfd/0x620 [ 500.494929] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 500.500145] RIP: 0033:0x45d36a [ 500.503362] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 500.522291] RSP: 002b:00007eff745f6a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 500.530125] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045d36a [ 500.537427] RDX: 00007eff745f6ae0 RSI: 00000000200001c0 RDI: 00007eff745f6b00 [ 500.544713] RBP: 000000000075bf20 R08: 00007eff745f6b40 R09: 00007eff745f6ae0 [ 500.551999] R10: 0000000000000000 R11: 0000000000000202 R12: 00007eff745f76d4 16:06:16 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 500.559285] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:16 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:16 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0xb4020000}}], 0x8000238, 0x0, 0x0) 16:06:16 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x8001, 0x40) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:06:16 executing program 3 (fault-call:0 fault-nth:43): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 500.850460] FAULT_INJECTION: forcing a failure. [ 500.850460] name failslab, interval 1, probability 0, space 0, times 0 [ 500.884458] CPU: 0 PID: 19543 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 500.892428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 500.901807] Call Trace: [ 500.904424] dump_stack+0x197/0x210 [ 500.908082] should_fail.cold+0xa/0x1b [ 500.911997] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 500.917131] ? lock_downgrade+0x880/0x880 [ 500.921336] __should_failslab+0x121/0x190 [ 500.925613] should_failslab+0x9/0x14 [ 500.929460] kmem_cache_alloc+0x2ae/0x700 [ 500.933631] ? lock_downgrade+0x880/0x880 [ 500.937804] alloc_vfsmnt+0x28/0x780 [ 500.941545] vfs_kern_mount.part.0+0x2a/0x410 [ 500.946063] do_mount+0x53e/0x2bc0 [ 500.949625] ? copy_mount_string+0x40/0x40 [ 500.953878] ? _copy_from_user+0xdd/0x150 [ 500.958044] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 500.963601] ? copy_mount_options+0x280/0x3a0 [ 500.968126] ksys_mount+0xdb/0x150 [ 500.971685] __x64_sys_mount+0xbe/0x150 [ 500.975681] do_syscall_64+0xfd/0x620 [ 500.979507] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 500.984729] RIP: 0033:0x45d36a [ 500.987943] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 501.006869] RSP: 002b:00007eff745f6a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 501.014626] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045d36a [ 501.021913] RDX: 00007eff745f6ae0 RSI: 00000000200001c0 RDI: 00007eff745f6b00 [ 501.029206] RBP: 000000000075bf20 R08: 00007eff745f6b40 R09: 00007eff745f6ae0 [ 501.036491] R10: 0000000000000000 R11: 0000000000000202 R12: 00007eff745f76d4 [ 501.043773] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:16 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:16 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x97ffffff00000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:16 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0xcc0d0000}}], 0x8000238, 0x0, 0x0) 16:06:16 executing program 3 (fault-call:0 fault-nth:44): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 501.504876] FAULT_INJECTION: forcing a failure. [ 501.504876] name failslab, interval 1, probability 0, space 0, times 0 [ 501.516436] CPU: 1 PID: 19560 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 501.524258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 501.533634] Call Trace: [ 501.536262] dump_stack+0x197/0x210 [ 501.539912] should_fail.cold+0xa/0x1b [ 501.543841] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 501.548978] ? lock_downgrade+0x880/0x880 [ 501.553171] __should_failslab+0x121/0x190 [ 501.557438] should_failslab+0x9/0x14 [ 501.561269] kmem_cache_alloc+0x2ae/0x700 [ 501.565443] ? lock_downgrade+0x880/0x880 [ 501.569628] alloc_vfsmnt+0x28/0x780 [ 501.573367] vfs_kern_mount.part.0+0x2a/0x410 [ 501.577912] do_mount+0x53e/0x2bc0 [ 501.581489] ? copy_mount_string+0x40/0x40 [ 501.585751] ? _copy_from_user+0xdd/0x150 [ 501.589923] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 501.595481] ? copy_mount_options+0x280/0x3a0 [ 501.600003] ksys_mount+0xdb/0x150 [ 501.603569] __x64_sys_mount+0xbe/0x150 [ 501.607569] do_syscall_64+0xfd/0x620 [ 501.611395] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 501.616597] RIP: 0033:0x45d36a [ 501.619807] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 501.639942] RSP: 002b:00007eff745f6a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 501.647684] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045d36a 16:06:17 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) r2 = socket(0x1e, 0x4, 0x0) r3 = gettid() rt_sigqueueinfo(r3, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffffa}) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x4000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x200, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x3, 0x4}, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x9, 0x902, 0xffffff56}, &(0x7f0000000100)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0xffff}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)={r5}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r3, r4, 0x0, 0x1e, &(0x7f00000000c0)='.&[bdev\xe2md5sumvboxnet0vmnet0%\x00', r5}, 0x30) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r6 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup3(r8, r7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_ENABLE(r9, 0x40086432, &(0x7f00000002c0)=0x3f) dup2(r6, r2) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x4, 0x4, 0x2, 0x0, {0xa, 0x4e20, 0xaa, @mcast1, 0x6}}}, 0x80, 0x0, 0x137, 0x0, 0xfffffffffffffd3f}, 0x0) r10 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x8000, 0x0) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000000100)) syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x4, 0x400202) setsockopt$TIPC_CONN_TIMEOUT(r10, 0x10f, 0x82, &(0x7f0000000040)=0x7, 0x4) r11 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r11, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r12 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r12, r11) accept$packet(r11, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0x14) sendmsg$nl_route_sched(r10, &(0x7f0000000540)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=@getqdisc={0x34, 0x26, 0x100, 0x70bd25, 0x25dfdbfc, {0x0, 0x0, 0x0, r13, {0xfff2, 0xd}, {0x4, 0x1}, {0x800e, 0xfff7}}, [{0x4}, {0x4}, {0x4}, {0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x48090) [ 501.654980] RDX: 00007eff745f6ae0 RSI: 00000000200001c0 RDI: 00007eff745f6b00 [ 501.662532] RBP: 000000000075bf20 R08: 00007eff745f6b40 R09: 00007eff745f6ae0 [ 501.669833] R10: 0000000000000000 R11: 0000000000000202 R12: 00007eff745f76d4 [ 501.677131] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:17 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x97ffffff00000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:06:17 executing program 3 (fault-call:0 fault-nth:45): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:17 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:17 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0xd40d0000}}], 0x8000238, 0x0, 0x0) [ 502.119066] FAULT_INJECTION: forcing a failure. [ 502.119066] name failslab, interval 1, probability 0, space 0, times 0 [ 502.146212] CPU: 0 PID: 19569 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 502.154147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 502.163516] Call Trace: [ 502.166142] dump_stack+0x197/0x210 [ 502.169798] should_fail.cold+0xa/0x1b [ 502.173712] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 502.178843] ? lock_downgrade+0x880/0x880 [ 502.183024] __should_failslab+0x121/0x190 [ 502.187280] should_failslab+0x9/0x14 [ 502.191105] __kmalloc_track_caller+0x2de/0x750 [ 502.195801] ? kstrdup_const+0x66/0x80 [ 502.199715] kstrdup+0x3a/0x70 [ 502.202941] kstrdup_const+0x66/0x80 [ 502.206682] alloc_vfsmnt+0xba/0x780 [ 502.210418] vfs_kern_mount.part.0+0x2a/0x410 [ 502.214941] do_mount+0x53e/0x2bc0 [ 502.218511] ? copy_mount_string+0x40/0x40 [ 502.222778] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 502.228334] ? copy_mount_options+0x280/0x3a0 [ 502.232851] ksys_mount+0xdb/0x150 [ 502.236413] __x64_sys_mount+0xbe/0x150 [ 502.240411] do_syscall_64+0xfd/0x620 [ 502.244231] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 502.249430] RIP: 0033:0x45d36a 16:06:17 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xc000000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) [ 502.252635] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 502.271547] RSP: 002b:00007eff745f6a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 502.279275] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045d36a [ 502.286562] RDX: 00007eff745f6ae0 RSI: 00000000200001c0 RDI: 00007eff745f6b00 [ 502.293845] RBP: 000000000075bf20 R08: 00007eff745f6b40 R09: 00007eff745f6ae0 [ 502.301136] R10: 0000000000000000 R11: 0000000000000202 R12: 00007eff745f76d4 [ 502.308453] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:17 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0xffffa888}}], 0x8000238, 0x0, 0x0) 16:06:17 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:18 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) 16:06:18 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x0) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:18 executing program 3 (fault-call:0 fault-nth:46): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:18 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x0) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:18 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x2}], 0x8000238, 0x0, 0x0) 16:06:18 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xc000000000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:06:18 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003d00)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0, 0xcd}, 0x0) r1 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r6}, [@IFA_LOCAL={0x8, 0x2, @multicast1}, @IFA_FLAGS={0x8, 0x3}]}, 0x28}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r10, @ANYBLOB="0000000000000000280012000c00010076657468000000e1801fed9e7ff2420048ea908ee378b374b4e4ae281b45b2c2dcebd97a0a3468ced201d398dc8bc05170e624154142b6699a933149c19c51c47e7b06669c80bb92af2c0119944538d864e8cee68949029e655eae8535943d2d0d0d84f01bc78be7dcbf709e57e66d0b0faa763bed8d94af99dd188534e9254ca99c50bfcd0201f8e43fc380f63e28c11c809b7060bba0e96b62fd5b65de7c74bc3bb3c56eaeaf20a8030c22f7670cdd0010a01006e40d58134b379b07a38ff2cc19290b91655ef36e48ebb3eded1e2e492316c31c79482f1d461ff760efd4dd200abe5b0b2f6e4dde5a7438efdd7b6cd4af982c51627823da954ebf06aefdf802c947d2d60c3e", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r10}, [@IFA_LOCAL={0x8, 0x2, @multicast1}, @IFA_FLAGS={0x8, 0x3}]}, 0x28}}, 0x0) r11 = socket$nl_route(0x10, 0x3, 0x0) r12 = socket$netlink(0x10, 0x3, 0x0) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r12, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r14, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r14}, [@IFA_LOCAL={0x8, 0x2, @multicast1}, @IFA_FLAGS={0x8, 0x3}]}, 0x28}}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@loopback, 0x0}, &(0x7f0000000140)=0x14) r16 = socket$nl_route(0x10, 0x3, 0x0) r17 = socket$netlink(0x10, 0x3, 0x0) r18 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r18, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r18, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r17, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="48fffe22008507aa820000edff00000000000000eeff0200ff19ffff0000000000", @ANYRES32=r19, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r19}, [@IFA_LOCAL={0x8, 0x2, @multicast1}, @IFA_FLAGS={0x8, 0x3}]}, 0x28}}, 0x0) r20 = socket$nl_route(0x10, 0x3, 0x0) r21 = socket$netlink(0x10, 0x3, 0x0) r22 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r22, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r22, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r21, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r23, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route(r20, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r23}, [@IFA_LOCAL={0x8, 0x2, @multicast1}, @IFA_FLAGS={0x8, 0x3}]}, 0x28}}, 0x0) r24 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r24, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) getsockopt$inet6_IPV6_IPSEC_POLICY(r24, 0x29, 0x22, &(0x7f0000000180)={{{@in6, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xe8) r26 = socket$nl_route(0x10, 0x3, 0x0) r27 = socket$netlink(0x10, 0x3, 0x0) r28 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r28, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r28, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r27, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r29, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route(r26, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r29}, [@IFA_LOCAL={0x8, 0x2, @multicast1}, @IFA_FLAGS={0x8, 0x3}]}, 0x28}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000002c0)={'team0\x00', r29}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000000580)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4100080}, 0xc, &(0x7f0000000540)={&(0x7f0000000300)={0x22c, r2, 0x100, 0x70bd29, 0x25dfdbff, {}, [{{0x8, 0x1, r6}, {0x48, 0x2, [{0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x101, 0x4, 0x0, 0x200}, {0x1, 0x8, 0x0, 0x6}]}}}]}}, {{0x8, 0x1, r10}, {0x7c, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r15}}}]}}, {{0x8, 0x1, r19}, {0xf8, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x200000}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}]}}, {{0x8, 0x1, r25}, {0x3c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r30}}}]}}]}, 0x22c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) [ 502.874667] FAULT_INJECTION: forcing a failure. [ 502.874667] name failslab, interval 1, probability 0, space 0, times 0 [ 502.899335] CPU: 0 PID: 19602 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 502.907209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 502.907223] Call Trace: [ 502.919320] dump_stack+0x197/0x210 [ 502.922974] should_fail.cold+0xa/0x1b [ 502.926874] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 502.926894] ? lock_downgrade+0x880/0x880 [ 502.926918] __should_failslab+0x121/0x190 [ 502.940397] should_failslab+0x9/0x14 [ 502.940414] __kmalloc_track_caller+0x2de/0x750 [ 502.940435] ? kstrdup_const+0x66/0x80 [ 502.940454] kstrdup+0x3a/0x70 [ 502.940468] kstrdup_const+0x66/0x80 [ 502.940488] alloc_vfsmnt+0xba/0x780 [ 502.940509] vfs_kern_mount.part.0+0x2a/0x410 [ 502.949219] do_mount+0x53e/0x2bc0 [ 502.949241] ? copy_mount_string+0x40/0x40 [ 502.949267] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 502.949280] ? copy_mount_options+0x280/0x3a0 [ 502.949298] ksys_mount+0xdb/0x150 [ 502.956409] __x64_sys_mount+0xbe/0x150 [ 502.968322] do_syscall_64+0xfd/0x620 [ 502.968346] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 502.968362] RIP: 0033:0x45d36a [ 502.968377] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 502.968385] RSP: 002b:00007eff745f6a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 502.984014] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045d36a [ 502.984026] RDX: 00007eff745f6ae0 RSI: 00000000200001c0 RDI: 00007eff745f6b00 [ 502.984036] RBP: 000000000075bf20 R08: 00007eff745f6b40 R09: 00007eff745f6ae0 [ 502.984045] R10: 0000000000000000 R11: 0000000000000202 R12: 00007eff745f76d4 [ 502.984054] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 [ 503.000413] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 503.177446] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 16:06:18 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x4}], 0x8000238, 0x0, 0x0) 16:06:18 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x0) sendfile(r0, r4, 0x0, 0x8000fffffffe) [ 503.218447] device bridge_slave_1 left promiscuous mode [ 503.233838] bridge0: port 2(bridge_slave_1) entered disabled state [ 503.290243] device bridge_slave_0 left promiscuous mode [ 503.295864] bridge0: port 1(bridge_slave_0) entered disabled state [ 503.365567] selinux_nlmsg_perm: 69 callbacks suppressed [ 503.365584] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=34048 sclass=netlink_route_socket pig=19619 comm=syz-executor.1 16:06:18 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xf5ffffff00000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:18 executing program 3 (fault-call:0 fault-nth:47): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 503.487649] FAULT_INJECTION: forcing a failure. [ 503.487649] name failslab, interval 1, probability 0, space 0, times 0 [ 503.512162] CPU: 0 PID: 19625 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 503.520015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 503.529389] Call Trace: [ 503.532001] dump_stack+0x197/0x210 [ 503.535673] should_fail.cold+0xa/0x1b [ 503.539585] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 503.544724] ? lock_downgrade+0x880/0x880 [ 503.548911] __should_failslab+0x121/0x190 [ 503.553168] should_failslab+0x9/0x14 [ 503.556989] kmem_cache_alloc_trace+0x2cc/0x760 [ 503.561678] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 503.567237] selinux_parse_opts_str+0x47f/0xaa0 [ 503.571921] ? trace_hardirqs_on+0x67/0x220 [ 503.576264] ? selinux_sb_show_options+0xf60/0xf60 [ 503.581210] ? __free_pages+0x72/0xb0 [ 503.585024] ? free_pages+0x46/0x50 [ 503.588668] ? selinux_sb_copy_data+0x319/0x4a0 [ 503.593375] security_sb_parse_opts_str+0x6b/0xb0 [ 503.598688] parse_security_options+0x62/0xb0 [ 503.603208] btrfs_mount_root+0x10f/0x18f0 [ 503.607476] ? btrfs_decode_error+0x70/0x70 [ 503.611816] ? rcu_read_lock_sched_held+0x110/0x130 [ 503.616845] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 503.622394] ? pcpu_alloc+0x144/0x12b0 [ 503.626333] ? pcpu_balance_workfn+0x1270/0x1270 [ 503.631142] ? __lockdep_init_map+0x10c/0x5b0 [ 503.635668] ? __lockdep_init_map+0x10c/0x5b0 [ 503.640199] mount_fs+0xa8/0x31f [ 503.643605] vfs_kern_mount.part.0+0x6f/0x410 [ 503.648149] vfs_kern_mount+0x40/0x60 [ 503.651967] btrfs_mount+0x2b4/0x15e2 [ 503.655786] ? kasan_check_write+0x14/0x20 [ 503.660040] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 503.664898] ? mark_held_locks+0xb1/0x100 [ 503.669063] ? check_preemption_disabled+0x48/0x290 [ 503.674095] ? btrfs_remount+0x1300/0x1300 [ 503.678358] ? rcu_read_lock_sched_held+0x110/0x130 [ 503.683391] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 503.688939] ? pcpu_alloc+0x144/0x12b0 [ 503.692860] ? pcpu_balance_workfn+0x1270/0x1270 [ 503.697662] ? __lockdep_init_map+0x10c/0x5b0 [ 503.702263] ? __lockdep_init_map+0x10c/0x5b0 [ 503.707317] mount_fs+0xa8/0x31f [ 503.710842] ? mount_fs+0xa8/0x31f [ 503.714541] vfs_kern_mount.part.0+0x6f/0x410 [ 503.719062] do_mount+0x53e/0x2bc0 [ 503.722638] ? copy_mount_string+0x40/0x40 [ 503.726891] ? _copy_from_user+0xdd/0x150 [ 503.731056] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 503.736607] ? copy_mount_options+0x280/0x3a0 [ 503.741122] ksys_mount+0xdb/0x150 [ 503.745034] __x64_sys_mount+0xbe/0x150 [ 503.749039] do_syscall_64+0xfd/0x620 [ 503.752872] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 503.758076] RIP: 0033:0x45d36a [ 503.761317] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 503.780247] RSP: 002b:00007eff745f6a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 503.787974] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045d36a [ 503.795258] RDX: 00007eff745f6ae0 RSI: 00000000200001c0 RDI: 00007eff745f6b00 [ 503.802798] RBP: 000000000075bf20 R08: 00007eff745f6b40 R09: 00007eff745f6ae0 [ 503.810103] R10: 0000000000000000 R11: 0000000000000202 R12: 00007eff745f76d4 [ 503.817390] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:19 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xf5ffffff00000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:06:19 executing program 3 (fault-call:0 fault-nth:48): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 504.449825] FAULT_INJECTION: forcing a failure. [ 504.449825] name failslab, interval 1, probability 0, space 0, times 0 [ 504.499280] CPU: 1 PID: 19639 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 504.507170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 504.516562] Call Trace: [ 504.519189] dump_stack+0x197/0x210 [ 504.522847] should_fail.cold+0xa/0x1b [ 504.526783] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 504.531915] ? lock_downgrade+0x880/0x880 [ 504.536123] __should_failslab+0x121/0x190 [ 504.540382] should_failslab+0x9/0x14 [ 504.544199] kmem_cache_alloc_trace+0x2cc/0x760 [ 504.549070] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 504.554843] selinux_parse_opts_str+0x47f/0xaa0 [ 504.559609] ? trace_hardirqs_on+0x67/0x220 [ 504.563973] ? selinux_sb_show_options+0xf60/0xf60 [ 504.568931] ? __free_pages+0x72/0xb0 [ 504.573021] ? free_pages+0x46/0x50 [ 504.576851] ? selinux_sb_copy_data+0x319/0x4a0 [ 504.581560] security_sb_parse_opts_str+0x6b/0xb0 [ 504.586777] parse_security_options+0x62/0xb0 [ 504.591296] btrfs_mount_root+0x10f/0x18f0 [ 504.595581] ? btrfs_decode_error+0x70/0x70 [ 504.600009] ? rcu_read_lock_sched_held+0x110/0x130 [ 504.605046] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 504.610602] ? pcpu_alloc+0x144/0x12b0 [ 504.614516] ? pcpu_balance_workfn+0x1270/0x1270 [ 504.619298] ? __lockdep_init_map+0x10c/0x5b0 [ 504.623813] ? __lockdep_init_map+0x10c/0x5b0 [ 504.628415] mount_fs+0xa8/0x31f [ 504.632297] vfs_kern_mount.part.0+0x6f/0x410 [ 504.637433] vfs_kern_mount+0x40/0x60 [ 504.641255] btrfs_mount+0x2b4/0x15e2 [ 504.645080] ? kasan_check_write+0x14/0x20 [ 504.649334] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 504.654193] ? mark_held_locks+0xb1/0x100 [ 504.658386] ? check_preemption_disabled+0x48/0x290 [ 504.663511] ? btrfs_remount+0x1300/0x1300 [ 504.667790] ? rcu_read_lock_sched_held+0x110/0x130 [ 504.673280] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 504.678927] ? pcpu_alloc+0x144/0x12b0 [ 504.682860] ? pcpu_balance_workfn+0x1270/0x1270 [ 504.687819] ? __lockdep_init_map+0x10c/0x5b0 [ 504.692705] ? __lockdep_init_map+0x10c/0x5b0 [ 504.697234] mount_fs+0xa8/0x31f [ 504.700631] ? mount_fs+0xa8/0x31f [ 504.704212] vfs_kern_mount.part.0+0x6f/0x410 [ 504.708738] do_mount+0x53e/0x2bc0 [ 504.712310] ? copy_mount_string+0x40/0x40 [ 504.716573] ? _copy_from_user+0xdd/0x150 [ 504.720933] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 504.726501] ? copy_mount_options+0x280/0x3a0 [ 504.731455] ksys_mount+0xdb/0x150 [ 504.735014] __x64_sys_mount+0xbe/0x150 [ 504.739008] do_syscall_64+0xfd/0x620 [ 504.742830] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 504.748119] RIP: 0033:0x45d36a [ 504.751322] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 504.770242] RSP: 002b:00007eff745f6a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 504.780409] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045d36a [ 504.787967] RDX: 00007eff745f6ae0 RSI: 00000000200001c0 RDI: 00007eff745f6b00 [ 504.795254] RBP: 000000000075bf20 R08: 00007eff745f6b40 R09: 00007eff745f6ae0 [ 504.803328] R10: 0000000000000000 R11: 0000000000000202 R12: 00007eff745f76d4 [ 504.810877] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:20 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:20 executing program 3 (fault-call:0 fault-nth:49): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 504.993970] FAULT_INJECTION: forcing a failure. [ 504.993970] name failslab, interval 1, probability 0, space 0, times 0 [ 505.008871] CPU: 1 PID: 19645 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 505.016715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 505.027302] Call Trace: [ 505.029913] dump_stack+0x197/0x210 [ 505.033565] should_fail.cold+0xa/0x1b [ 505.037475] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 505.042602] ? lock_downgrade+0x880/0x880 [ 505.046785] __should_failslab+0x121/0x190 [ 505.051745] should_failslab+0x9/0x14 [ 505.055668] kmem_cache_alloc_trace+0x2cc/0x760 [ 505.060352] ? __kmalloc_node+0x51/0x80 [ 505.064436] btrfs_mount_root+0x187/0x18f0 [ 505.068690] ? btrfs_decode_error+0x70/0x70 [ 505.073071] ? rcu_read_lock_sched_held+0x110/0x130 [ 505.078103] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 505.083656] ? pcpu_alloc+0x144/0x12b0 [ 505.087576] ? pcpu_balance_workfn+0x1270/0x1270 [ 505.092363] ? __lockdep_init_map+0x10c/0x5b0 [ 505.096978] ? __lockdep_init_map+0x10c/0x5b0 [ 505.101504] mount_fs+0xa8/0x31f [ 505.104898] vfs_kern_mount.part.0+0x6f/0x410 [ 505.109855] vfs_kern_mount+0x40/0x60 [ 505.113755] btrfs_mount+0x2b4/0x15e2 [ 505.117574] ? kasan_check_write+0x14/0x20 [ 505.121830] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 505.126689] ? mark_held_locks+0xb1/0x100 [ 505.130858] ? check_preemption_disabled+0x48/0x290 [ 505.135890] ? btrfs_remount+0x1300/0x1300 [ 505.140147] ? rcu_read_lock_sched_held+0x110/0x130 [ 505.145177] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 505.150730] ? pcpu_alloc+0x144/0x12b0 [ 505.154651] ? pcpu_balance_workfn+0x1270/0x1270 [ 505.159438] ? __lockdep_init_map+0x10c/0x5b0 [ 505.164132] ? __lockdep_init_map+0x10c/0x5b0 [ 505.168644] mount_fs+0xa8/0x31f [ 505.172024] ? mount_fs+0xa8/0x31f [ 505.175592] vfs_kern_mount.part.0+0x6f/0x410 [ 505.180112] do_mount+0x53e/0x2bc0 [ 505.183681] ? copy_mount_string+0x40/0x40 [ 505.187933] ? _copy_from_user+0xdd/0x150 [ 505.192199] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 505.197775] ? copy_mount_options+0x280/0x3a0 [ 505.203344] ksys_mount+0xdb/0x150 [ 505.206906] __x64_sys_mount+0xbe/0x150 [ 505.210921] do_syscall_64+0xfd/0x620 [ 505.214767] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 505.219972] RIP: 0033:0x45d36a [ 505.223181] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 505.242101] RSP: 002b:00007eff745f6a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 505.249822] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045d36a [ 505.257138] RDX: 00007eff745f6ae0 RSI: 00000000200001c0 RDI: 00007eff745f6b00 [ 505.264528] RBP: 000000000075bf20 R08: 00007eff745f6b40 R09: 00007eff745f6ae0 [ 505.264538] R10: 0000000000000000 R11: 0000000000000202 R12: 00007eff745f76d4 [ 505.264545] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:20 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:06:21 executing program 3 (fault-call:0 fault-nth:50): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 505.600868] FAULT_INJECTION: forcing a failure. [ 505.600868] name failslab, interval 1, probability 0, space 0, times 0 [ 505.619039] CPU: 0 PID: 19654 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 505.627438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 505.636815] Call Trace: [ 505.639513] dump_stack+0x197/0x210 [ 505.643171] should_fail.cold+0xa/0x1b [ 505.647090] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 505.652224] ? lock_downgrade+0x880/0x880 [ 505.656407] __should_failslab+0x121/0x190 [ 505.660671] should_failslab+0x9/0x14 [ 505.664488] kmem_cache_alloc_trace+0x2cc/0x760 [ 505.669182] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 505.674739] ? check_preemption_disabled+0x48/0x290 [ 505.679890] selinux_parse_opts_str+0x414/0xaa0 [ 505.696490] ? trace_hardirqs_on+0x67/0x220 [ 505.700854] ? selinux_sb_show_options+0xf60/0xf60 [ 505.705827] ? __free_pages+0x72/0xb0 [ 505.709659] ? free_pages+0x46/0x50 [ 505.713323] ? selinux_sb_copy_data+0x319/0x4a0 [ 505.718132] security_sb_parse_opts_str+0x6b/0xb0 [ 505.723175] parse_security_options+0x62/0xb0 [ 505.727733] btrfs_mount_root+0x10f/0x18f0 [ 505.732035] ? btrfs_decode_error+0x70/0x70 [ 505.736411] ? rcu_read_lock_sched_held+0x110/0x130 [ 505.741550] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 505.747123] ? pcpu_alloc+0x144/0x12b0 [ 505.751047] ? pcpu_balance_workfn+0x1270/0x1270 [ 505.755825] ? __lockdep_init_map+0x10c/0x5b0 [ 505.760425] ? __lockdep_init_map+0x10c/0x5b0 [ 505.766244] mount_fs+0xa8/0x31f [ 505.769632] vfs_kern_mount.part.0+0x6f/0x410 [ 505.774146] vfs_kern_mount+0x40/0x60 [ 505.777978] btrfs_mount+0x2b4/0x15e2 [ 505.781799] ? kasan_check_write+0x14/0x20 [ 505.786213] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 505.791079] ? mark_held_locks+0xb1/0x100 [ 505.795530] ? check_preemption_disabled+0x48/0x290 [ 505.800661] ? btrfs_remount+0x1300/0x1300 [ 505.804924] ? rcu_read_lock_sched_held+0x110/0x130 [ 505.809959] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 505.815512] ? pcpu_alloc+0x144/0x12b0 [ 505.819433] ? pcpu_balance_workfn+0x1270/0x1270 [ 505.824215] ? __lockdep_init_map+0x10c/0x5b0 [ 505.828733] ? __lockdep_init_map+0x10c/0x5b0 [ 505.833248] mount_fs+0xa8/0x31f [ 505.836633] ? mount_fs+0xa8/0x31f [ 505.840197] vfs_kern_mount.part.0+0x6f/0x410 [ 505.844720] do_mount+0x53e/0x2bc0 [ 505.848274] ? retint_kernel+0x2d/0x2d [ 505.852177] ? copy_mount_string+0x40/0x40 [ 505.856426] ? copy_mount_options+0x1ea/0x3a0 [ 505.860934] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 505.865792] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 505.871347] ? copy_mount_options+0x280/0x3a0 [ 505.876026] ksys_mount+0xdb/0x150 [ 505.879599] __x64_sys_mount+0xbe/0x150 [ 505.883605] do_syscall_64+0xfd/0x620 [ 505.887435] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 505.892643] RIP: 0033:0x45d36a [ 505.895861] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 505.914808] RSP: 002b:00007eff745f6a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 505.922560] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045d36a [ 505.929848] RDX: 00007eff745f6ae0 RSI: 00000000200001c0 RDI: 00007eff745f6b00 [ 505.937136] RBP: 000000000075bf20 R08: 00007eff745f6b40 R09: 00007eff745f6ae0 [ 505.944432] R10: 0000000000000000 R11: 0000000000000202 R12: 00007eff745f76d4 [ 505.951733] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:21 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xf8f73f0000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) [ 511.751960] device hsr_slave_1 left promiscuous mode [ 511.796986] device hsr_slave_0 left promiscuous mode [ 511.853802] team0 (unregistering): Port device team_slave_1 removed [ 511.867716] team0 (unregistering): Port device team_slave_0 removed [ 511.891803] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 511.935067] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 512.093356] bond0 (unregistering): Released all slaves [ 512.174758] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 512.200107] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 512.266655] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 16:06:27 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x4) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x167a00, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000140)=0x800, 0x4) 16:06:27 executing program 3 (fault-call:0 fault-nth:51): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:27 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(0xffffffffffffffff, r4, 0x0, 0x8000fffffffe) 16:06:27 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xfcfdffff00000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:27 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x6}], 0x8000238, 0x0, 0x0) 16:06:27 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xf8f73f0000000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 512.431651] FAULT_INJECTION: forcing a failure. [ 512.431651] name failslab, interval 1, probability 0, space 0, times 0 [ 512.490112] CPU: 1 PID: 19665 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 512.497977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 512.507349] Call Trace: [ 512.509968] dump_stack+0x197/0x210 [ 512.513633] should_fail.cold+0xa/0x1b [ 512.517555] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 512.522694] ? lock_downgrade+0x880/0x880 [ 512.526882] __should_failslab+0x121/0x190 [ 512.531139] should_failslab+0x9/0x14 [ 512.534962] kmem_cache_alloc_node_trace+0x274/0x720 [ 512.540101] __kmalloc_node+0x3d/0x80 [ 512.543915] kvmalloc_node+0xbd/0x100 [ 512.547735] btrfs_mount_root+0x13e/0x18f0 [ 512.551994] ? btrfs_decode_error+0x70/0x70 [ 512.556337] ? rcu_read_lock_sched_held+0x110/0x130 [ 512.561368] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 512.566921] ? pcpu_alloc+0x144/0x12b0 [ 512.570855] ? pcpu_balance_workfn+0x1270/0x1270 [ 512.575645] ? __lockdep_init_map+0x10c/0x5b0 [ 512.580172] ? __lockdep_init_map+0x10c/0x5b0 [ 512.584691] mount_fs+0xa8/0x31f [ 512.588078] vfs_kern_mount.part.0+0x6f/0x410 [ 512.592599] vfs_kern_mount+0x40/0x60 [ 512.596430] btrfs_mount+0x2b4/0x15e2 [ 512.600254] ? kasan_check_write+0x14/0x20 [ 512.604507] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 512.609365] ? mark_held_locks+0xb1/0x100 [ 512.613541] ? check_preemption_disabled+0x48/0x290 [ 512.618580] ? btrfs_remount+0x1300/0x1300 [ 512.622842] ? rcu_read_lock_sched_held+0x110/0x130 [ 512.627883] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 512.633434] ? pcpu_alloc+0x144/0x12b0 [ 512.637349] ? pcpu_balance_workfn+0x1270/0x1270 [ 512.642122] ? __lockdep_init_map+0x10c/0x5b0 [ 512.646633] ? __lockdep_init_map+0x10c/0x5b0 [ 512.651149] mount_fs+0xa8/0x31f [ 512.654533] ? mount_fs+0xa8/0x31f [ 512.658184] vfs_kern_mount.part.0+0x6f/0x410 [ 512.662706] do_mount+0x53e/0x2bc0 [ 512.666267] ? copy_mount_string+0x40/0x40 [ 512.670525] ? _copy_from_user+0xdd/0x150 [ 512.674693] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 512.680244] ? copy_mount_options+0x280/0x3a0 [ 512.684754] ksys_mount+0xdb/0x150 [ 512.688305] __x64_sys_mount+0xbe/0x150 [ 512.692297] do_syscall_64+0xfd/0x620 [ 512.696113] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 512.701421] RIP: 0033:0x45d36a [ 512.704648] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 512.723580] RSP: 002b:00007eff745f6a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 512.731311] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045d36a 16:06:28 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x7}], 0x8000238, 0x0, 0x0) 16:06:28 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(0xffffffffffffffff, r4, 0x0, 0x8000fffffffe) [ 512.738595] RDX: 00007eff745f6ae0 RSI: 00000000200001c0 RDI: 00007eff745f6b00 [ 512.745890] RBP: 000000000075bf20 R08: 00007eff745f6b40 R09: 00007eff745f6ae0 [ 512.753174] R10: 0000000000000000 R11: 0000000000000202 R12: 00007eff745f76d4 [ 512.760476] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:28 executing program 1: r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) r1 = add_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="a45074c8086f6f8822bee668c94fca18020ab2443fcfcb1344042ce95e005214a044c5ebcdab78924a547ae8074a05d7e8aeec24a3ad02a9e46041ef47c5b5a4ff293ff7c8d66ff8fde6eae983d54b57a11db5b4fb7a00b47999a29607ebdf1b5d7ed470ea2f4059363d3fdaa25bfbbbd812f010f9c9017404ef0e8968912c2afc495a8c30a4e07381faebcef24189c6d9aa25142691511774501fab1814912411d83cf69faaf34756ccf18adcb33b4ebb8fb8483bd6961ff787a26c5fc1bb7b", 0xc0, r0) r2 = add_key(&(0x7f0000000140)='trusted\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r1, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) renameat2(r5, &(0x7f00000002c0)='./file0\x00', r8, &(0x7f0000000300)='./file0\x00', 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r9 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ocfs2_control\x00', 0x20200, 0x0) connect$bt_sco(r9, &(0x7f0000000200)={0x1f, {0x1, 0x7, 0x40, 0xfb, 0xe1, 0x4}}, 0x8) r10 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r10, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:06:28 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x8}], 0x8000238, 0x0, 0x0) 16:06:28 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(0xffffffffffffffff, r4, 0x0, 0x8000fffffffe) [ 513.007041] encrypted_key: insufficient parameters specified 16:06:28 executing program 3 (fault-call:0 fault-nth:52): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 513.128557] encrypted_key: insufficient parameters specified 16:06:28 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x9}], 0x8000238, 0x0, 0x0) 16:06:28 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8000fffffffe) 16:06:28 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xfcfdffff00000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:06:28 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDCTL_DSP_POST(r4, 0x5008, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:06:28 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0xa}], 0x8000238, 0x0, 0x0) 16:06:28 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8000fffffffe) 16:06:28 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) [ 513.415338] FAULT_INJECTION: forcing a failure. [ 513.415338] name failslab, interval 1, probability 0, space 0, times 0 [ 513.447553] CPU: 1 PID: 19704 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 513.455432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 513.464808] Call Trace: [ 513.467424] dump_stack+0x197/0x210 [ 513.471083] should_fail.cold+0xa/0x1b [ 513.475122] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 513.480280] ? lock_downgrade+0x880/0x880 [ 513.484473] __should_failslab+0x121/0x190 [ 513.488739] should_failslab+0x9/0x14 [ 513.492564] kmem_cache_alloc_trace+0x2cc/0x760 [ 513.497268] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 513.502839] selinux_parse_opts_str+0x47f/0xaa0 [ 513.507530] ? trace_hardirqs_on+0x67/0x220 [ 513.511880] ? selinux_sb_show_options+0xf60/0xf60 [ 513.516826] ? __free_pages+0x72/0xb0 [ 513.520645] ? free_pages+0x46/0x50 [ 513.524287] ? selinux_sb_copy_data+0x319/0x4a0 [ 513.528990] security_sb_parse_opts_str+0x6b/0xb0 [ 513.533879] parse_security_options+0x62/0xb0 [ 513.538401] btrfs_mount_root+0x10f/0x18f0 [ 513.542672] ? btrfs_decode_error+0x70/0x70 [ 513.547015] ? rcu_read_lock_sched_held+0x110/0x130 [ 513.552048] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 513.557598] ? pcpu_alloc+0x144/0x12b0 [ 513.561512] ? pcpu_balance_workfn+0x1270/0x1270 [ 513.566293] ? __lockdep_init_map+0x10c/0x5b0 [ 513.570967] ? __lockdep_init_map+0x10c/0x5b0 [ 513.575500] mount_fs+0xa8/0x31f [ 513.578896] vfs_kern_mount.part.0+0x6f/0x410 [ 513.583694] vfs_kern_mount+0x40/0x60 [ 513.587537] btrfs_mount+0x2b4/0x15e2 [ 513.591375] ? kasan_check_write+0x14/0x20 [ 513.595643] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 513.600502] ? mark_held_locks+0xb1/0x100 [ 513.604673] ? check_preemption_disabled+0x48/0x290 [ 513.609711] ? btrfs_remount+0x1300/0x1300 [ 513.613977] ? rcu_read_lock_sched_held+0x110/0x130 [ 513.620058] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 513.625609] ? pcpu_alloc+0x144/0x12b0 [ 513.629524] ? pcpu_balance_workfn+0x1270/0x1270 [ 513.634294] ? __lockdep_init_map+0x10c/0x5b0 [ 513.638808] ? __lockdep_init_map+0x10c/0x5b0 [ 513.643342] mount_fs+0xa8/0x31f [ 513.646722] ? mount_fs+0xa8/0x31f [ 513.650288] vfs_kern_mount.part.0+0x6f/0x410 [ 513.654802] do_mount+0x53e/0x2bc0 [ 513.658354] ? retint_kernel+0x2d/0x2d [ 513.662264] ? copy_mount_string+0x40/0x40 [ 513.666511] ? copy_mount_options+0x1d9/0x3a0 [ 513.671025] ? __sanitizer_cov_trace_pc+0x50/0x50 [ 513.675890] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 513.681444] ? copy_mount_options+0x280/0x3a0 [ 513.685956] ksys_mount+0xdb/0x150 [ 513.689517] __x64_sys_mount+0xbe/0x150 [ 513.693514] do_syscall_64+0xfd/0x620 [ 513.697337] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 513.702537] RIP: 0033:0x45d36a [ 513.705742] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 513.724669] RSP: 002b:00007eff745f6a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 513.732401] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045d36a [ 513.739683] RDX: 00007eff745f6ae0 RSI: 00000000200001c0 RDI: 00007eff745f6b00 [ 513.746975] RBP: 000000000075bf20 R08: 00007eff745f6b40 R09: 00007eff745f6ae0 [ 513.754256] R10: 0000000000000000 R11: 0000000000000202 R12: 00007eff745f76d4 16:06:29 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0xc}], 0x8000238, 0x0, 0x0) 16:06:29 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8000fffffffe) [ 513.761556] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:29 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) r2 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(r5, 0xc0585609, &(0x7f00000002c0)={0xffffff7e, 0xc, 0x4, 0x80000040, 0xe0, {r6, r7/1000+10000}, {0x4, 0xc, 0x8, 0x0, 0x36, 0x40, "8d43b421"}, 0xfe4, 0x4, @userptr=0x8c60, 0x1443, 0x0, 0xffffffffffffffff}) ioctl$BLKPBSZGET(r8, 0x127b, &(0x7f0000000200)) keyctl$read(0xb, r2, &(0x7f0000000240)=""/112, 0x349b7f55) r9 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$get_security(0x11, r9, &(0x7f0000000080)=""/233, 0xe9) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:06:29 executing program 3 (fault-call:0 fault-nth:53): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:29 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x0) [ 513.919515] encrypted_key: insufficient parameters specified 16:06:29 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0xe}], 0x8000238, 0x0, 0x0) [ 513.970570] encrypted_key: insufficient parameters specified [ 514.032708] FAULT_INJECTION: forcing a failure. [ 514.032708] name failslab, interval 1, probability 0, space 0, times 0 [ 514.099404] CPU: 1 PID: 19729 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 514.107696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 514.117068] Call Trace: [ 514.119699] dump_stack+0x197/0x210 [ 514.123351] should_fail.cold+0xa/0x1b [ 514.127256] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 514.132385] ? lock_downgrade+0x880/0x880 [ 514.136575] __should_failslab+0x121/0x190 [ 514.140836] should_failslab+0x9/0x14 [ 514.144656] __kmalloc_track_caller+0x2de/0x750 [ 514.149346] ? __lock_is_held+0xb6/0x140 [ 514.153421] ? btrfs_mount_root+0x362/0x18f0 [ 514.157848] kstrdup+0x3a/0x70 [ 514.161057] btrfs_mount_root+0x362/0x18f0 [ 514.165317] ? btrfs_decode_error+0x70/0x70 [ 514.169655] ? rcu_read_lock_sched_held+0x110/0x130 [ 514.174691] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 514.180251] ? pcpu_alloc+0x144/0x12b0 [ 514.184201] ? pcpu_balance_workfn+0x1270/0x1270 [ 514.188981] ? __lockdep_init_map+0x10c/0x5b0 [ 514.193497] ? __lockdep_init_map+0x10c/0x5b0 [ 514.198015] mount_fs+0xa8/0x31f [ 514.201405] vfs_kern_mount.part.0+0x6f/0x410 [ 514.205922] vfs_kern_mount+0x40/0x60 [ 514.209745] btrfs_mount+0x2b4/0x15e2 [ 514.213591] ? kasan_check_write+0x14/0x20 [ 514.217932] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 514.222791] ? mark_held_locks+0xb1/0x100 [ 514.226959] ? check_preemption_disabled+0x48/0x290 [ 514.231988] ? btrfs_remount+0x1300/0x1300 [ 514.236250] ? rcu_read_lock_sched_held+0x110/0x130 [ 514.241278] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 514.246968] ? pcpu_alloc+0x144/0x12b0 [ 514.250889] ? pcpu_balance_workfn+0x1270/0x1270 [ 514.255766] ? __lockdep_init_map+0x10c/0x5b0 [ 514.260292] ? __lockdep_init_map+0x10c/0x5b0 [ 514.264810] mount_fs+0xa8/0x31f [ 514.268190] ? mount_fs+0xa8/0x31f [ 514.271788] vfs_kern_mount.part.0+0x6f/0x410 [ 514.276317] do_mount+0x53e/0x2bc0 [ 514.279925] ? copy_mount_string+0x40/0x40 [ 514.284191] ? _copy_from_user+0xdd/0x150 [ 514.288499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 514.294062] ? copy_mount_options+0x280/0x3a0 [ 514.298586] ksys_mount+0xdb/0x150 [ 514.302146] __x64_sys_mount+0xbe/0x150 [ 514.306144] do_syscall_64+0xfd/0x620 [ 514.309968] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 514.315171] RIP: 0033:0x45d36a [ 514.318377] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 514.337301] RSP: 002b:00007eff745f6a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 16:06:29 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x10}], 0x8000238, 0x0, 0x0) [ 514.345058] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045d36a [ 514.352355] RDX: 00007eff745f6ae0 RSI: 00000000200001c0 RDI: 00007eff745f6b00 [ 514.359639] RBP: 000000000075bf20 R08: 00007eff745f6b40 R09: 00007eff745f6ae0 [ 514.366926] R10: 0000000000000000 R11: 0000000000000202 R12: 00007eff745f76d4 [ 514.374217] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:30 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:06:30 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84000) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) write$FUSE_LK(r1, &(0x7f0000000080)={0x28, 0x0, 0x7, {{0x2, 0x7, 0x8af6d88c7d8b072a, r2}}}, 0x28) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x10, &(0x7f0000000180)={[{@metacopy_off='metacopy=off'}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}]}) connect$llc(0xffffffffffffffff, &(0x7f00000000c0)={0x1a, 0x303, 0x0, 0xfc, 0x1, 0x5, @broadcast}, 0x10) r3 = socket$kcm(0x2, 0x2, 0x0) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r5 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r5, r4) ioctl$sock_ax25_SIOCDELRT(r4, 0x890c, &(0x7f00000007c0)={@default, @bcast, 0x5, [@default, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) readv(r5, &(0x7f0000000740)=[{&(0x7f0000000200)=""/227, 0xe3}, {&(0x7f0000000400)=""/210, 0xd2}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000000500)=""/132, 0x84}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/125, 0x7d}, {&(0x7f0000000680)=""/161, 0xa1}], 0x7) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:06:30 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x0) 16:06:30 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x14}], 0x8000238, 0x0, 0x0) 16:06:30 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xfdffffff00000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:30 executing program 3 (fault-call:0 fault-nth:54): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:30 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x60}], 0x8000238, 0x0, 0x0) 16:06:30 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x0) [ 514.940412] FAULT_INJECTION: forcing a failure. [ 514.940412] name failslab, interval 1, probability 0, space 0, times 0 [ 514.979339] CPU: 0 PID: 19757 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 514.987193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 514.996596] Call Trace: [ 514.999234] dump_stack+0x197/0x210 [ 515.002899] should_fail.cold+0xa/0x1b [ 515.006829] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 515.011975] ? lock_downgrade+0x880/0x880 [ 515.016165] __should_failslab+0x121/0x190 [ 515.020429] should_failslab+0x9/0x14 [ 515.024259] kmem_cache_alloc_trace+0x2cc/0x760 [ 515.028956] ? __kmalloc_node+0x51/0x80 [ 515.032967] btrfs_mount_root+0x187/0x18f0 [ 515.037244] ? btrfs_decode_error+0x70/0x70 [ 515.041611] ? rcu_read_lock_sched_held+0x110/0x130 [ 515.046654] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 515.052219] ? pcpu_alloc+0x144/0x12b0 [ 515.056146] ? pcpu_balance_workfn+0x1270/0x1270 [ 515.060937] ? __lockdep_init_map+0x10c/0x5b0 [ 515.065468] ? __lockdep_init_map+0x10c/0x5b0 [ 515.070009] mount_fs+0xa8/0x31f [ 515.073407] vfs_kern_mount.part.0+0x6f/0x410 [ 515.077929] vfs_kern_mount+0x40/0x60 [ 515.081763] btrfs_mount+0x2b4/0x15e2 [ 515.085589] ? kasan_check_write+0x14/0x20 [ 515.089846] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 515.094716] ? mark_held_locks+0xb1/0x100 [ 515.098898] ? check_preemption_disabled+0x48/0x290 [ 515.103951] ? btrfs_remount+0x1300/0x1300 [ 515.108923] ? rcu_read_lock_sched_held+0x110/0x130 [ 515.114160] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 515.119760] ? pcpu_alloc+0x144/0x12b0 [ 515.123717] ? pcpu_balance_workfn+0x1270/0x1270 [ 515.128510] ? __lockdep_init_map+0x10c/0x5b0 [ 515.133041] ? __lockdep_init_map+0x10c/0x5b0 [ 515.137571] mount_fs+0xa8/0x31f [ 515.140968] ? mount_fs+0xa8/0x31f [ 515.144547] vfs_kern_mount.part.0+0x6f/0x410 [ 515.149081] do_mount+0x53e/0x2bc0 [ 515.152653] ? copy_mount_string+0x40/0x40 [ 515.156920] ? _copy_from_user+0xdd/0x150 [ 515.161113] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 515.166684] ? copy_mount_options+0x280/0x3a0 [ 515.171220] ksys_mount+0xdb/0x150 [ 515.174800] __x64_sys_mount+0xbe/0x150 [ 515.178827] do_syscall_64+0xfd/0x620 [ 515.182663] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 515.187877] RIP: 0033:0x45d36a [ 515.191108] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 515.210131] RSP: 002b:00007eff745f6a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 515.217869] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045d36a [ 515.225182] RDX: 00007eff745f6ae0 RSI: 00000000200001c0 RDI: 00007eff745f6b00 [ 515.232482] RBP: 000000000075bf20 R08: 00007eff745f6b40 R09: 00007eff745f6ae0 16:06:30 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @loopback}, 0x80, 0x0}, 0x0) 16:06:30 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x2b4}], 0x8000238, 0x0, 0x0) 16:06:30 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x600}], 0x8000238, 0x0, 0x0) 16:06:30 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$HDIO_GETGEO(r4, 0x301, &(0x7f0000000040)) r5 = semget$private(0x0, 0x7, 0x0) semop(r5, &(0x7f0000000240)=[{0x0, 0xfffffffffffffff8}], 0x2) semop(r5, &(0x7f0000000000)=[{0x0, 0xffff, 0x1800}], 0x1) semctl$IPC_STAT(r5, 0x0, 0x2, &(0x7f0000000400)=""/4096) r6 = socket$caif_stream(0x25, 0x1, 0x1) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, r6, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x4, 0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) [ 515.239784] R10: 0000000000000000 R11: 0000000000000202 R12: 00007eff745f76d4 [ 515.247085] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:31 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xfdffffff00000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:06:31 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x700}], 0x8000238, 0x0, 0x0) 16:06:31 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet6_sctp(0xa, 0x80000000000001, 0x84) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) 16:06:31 executing program 3 (fault-call:0 fault-nth:55): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 516.075873] FAULT_INJECTION: forcing a failure. [ 516.075873] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 516.087766] CPU: 0 PID: 19791 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 516.095582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.104957] Call Trace: [ 516.107577] dump_stack+0x197/0x210 [ 516.111238] should_fail.cold+0xa/0x1b [ 516.115148] ? kasan_kmalloc+0xce/0xf0 [ 516.119059] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 516.124198] ? mark_held_locks+0x100/0x100 [ 516.128454] ? do_syscall_64+0xfd/0x620 [ 516.132448] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 516.137836] __alloc_pages_nodemask+0x1ee/0x750 [ 516.142527] ? fs_reclaim_acquire+0x20/0x20 [ 516.146869] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 516.152433] ? __alloc_pages_slowpath+0x2870/0x2870 [ 516.157494] ? find_held_lock+0x35/0x130 [ 516.161589] cache_grow_begin+0x91/0x8c0 [ 516.165673] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 516.171239] kmem_cache_alloc_trace+0x685/0x760 [ 516.175934] btrfs_mount_root+0x187/0x18f0 [ 516.180201] ? btrfs_decode_error+0x70/0x70 [ 516.184558] ? rcu_read_lock_sched_held+0x110/0x130 [ 516.189686] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 516.195255] ? pcpu_alloc+0x144/0x12b0 [ 516.199176] ? pcpu_balance_workfn+0x1270/0x1270 [ 516.203968] ? __lockdep_init_map+0x10c/0x5b0 [ 516.208497] ? __lockdep_init_map+0x10c/0x5b0 [ 516.213036] mount_fs+0xa8/0x31f [ 516.216460] vfs_kern_mount.part.0+0x6f/0x410 [ 516.220983] vfs_kern_mount+0x40/0x60 [ 516.224801] btrfs_mount+0x2b4/0x15e2 [ 516.228625] ? kasan_check_write+0x14/0x20 [ 516.232885] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 516.238093] ? mark_held_locks+0xb1/0x100 [ 516.242875] ? check_preemption_disabled+0x48/0x290 [ 516.247912] ? btrfs_remount+0x1300/0x1300 [ 516.252181] ? rcu_read_lock_sched_held+0x110/0x130 [ 516.257225] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 516.262782] ? pcpu_alloc+0x144/0x12b0 [ 516.266696] ? pcpu_balance_workfn+0x1270/0x1270 [ 516.271477] ? __lockdep_init_map+0x10c/0x5b0 [ 516.275996] ? __lockdep_init_map+0x10c/0x5b0 [ 516.280516] mount_fs+0xa8/0x31f [ 516.283907] ? mount_fs+0xa8/0x31f [ 516.287474] vfs_kern_mount.part.0+0x6f/0x410 [ 516.291989] do_mount+0x53e/0x2bc0 [ 516.295548] ? copy_mount_string+0x40/0x40 [ 516.299809] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 516.305712] ? copy_mount_options+0x280/0x3a0 [ 516.310235] ksys_mount+0xdb/0x150 [ 516.313794] __x64_sys_mount+0xbe/0x150 [ 516.317795] do_syscall_64+0xfd/0x620 [ 516.321614] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 516.326813] RIP: 0033:0x45d36a [ 516.330041] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 516.348975] RSP: 002b:00007eff745f6a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 516.356701] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045d36a [ 516.363981] RDX: 00007eff745f6ae0 RSI: 00000000200001c0 RDI: 00007eff745f6b00 [ 516.371272] RBP: 000000000075bf20 R08: 00007eff745f6b40 R09: 00007eff745f6ae0 [ 516.378559] R10: 0000000000000000 R11: 0000000000000202 R12: 00007eff745f76d4 [ 516.385848] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:32 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:32 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x900}], 0x8000238, 0x0, 0x0) 16:06:32 executing program 3 (fault-call:0 fault-nth:56): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:32 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f0000000080)={0x1, 0x8, 0x4, 0x2000200, 0x6, {0x77359400}, {0x3, 0xc, 0x80, 0x4, 0xa8, 0x5, "40da7445"}, 0x5, 0x2, @planes=&(0x7f0000000040)={0x0, 0x7b, @userptr=0x1f, 0x1ff}, 0xbd, 0x0, r3}) 16:06:32 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socket$inet6_sctp(0xa, 0x80000000000001, 0x84) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) 16:06:32 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0xa00}], 0x8000238, 0x0, 0x0) 16:06:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400001c00810ce00f80ecdb4cb9f207c804a00d000000880062fb0a0002000a0ada1b40d805000300c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r4 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r4, r3) sendmsg$kcm(r3, &(0x7f0000000240)={&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e22, @multicast1}, 0x2, 0x1, 0x3, 0x3}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000080)="e4997a76218fffd12c804512c327cbafb9b4fd912ae9b30da184b1b19a4d2dca3e4762ecc6d490a826502a995e5646ac1da1d992ac8b0467e43849072c73f0b3576890d8821fa18fcfe1f7bfbd6eedb8620142428e2f06faac7dde8ebea1c5d92ca3c1dceedf0f0d100ececfb3f79fde62ce75e806b67936dcba2ddee0243df9c4a99d78f215f43c9a7983b4e32784c2564515343aa04868735279933d5f256dd2b9a734be76cb1b2394d48187f5cdae604e33", 0xb3}, {&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000000140)="ccb33e38b8c2311bc6a11e2c1694fdb60c6dd86a0a77312de02d7d8ae785a533eee79dff58c549830f1e8409b65689679e8ca14ff1cc9c6d12d532547ea8098de9a3c407574955fc07f0d9a2426b0c66b43849c88d46d1d11314a063152a9aa1b2e2afe8d39e59d2e59df4a426a5fd030d60367dc5549fd1ba50c1fc0dfa3b8c61e697d256b4cc092db39be5401a59a4505e74681d3439411a4c5353510c828e9afd2b8cbe1aabe944229a285376ae67822a4b080de611067b", 0xb9}], 0x3, &(0x7f0000001400)=ANY=[@ANYBLOB="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"], 0x370}, 0x20048000) [ 516.778654] FAULT_INJECTION: forcing a failure. [ 516.778654] name failslab, interval 1, probability 0, space 0, times 0 16:06:32 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) connect$inet6(r1, &(0x7f00008c0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) ioctl$int_in(r0, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) [ 516.879214] CPU: 1 PID: 19807 Comm: syz-executor.3 Not tainted 4.19.91-syzkaller #0 [ 516.887178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.896558] Call Trace: [ 516.899174] dump_stack+0x197/0x210 [ 516.903008] should_fail.cold+0xa/0x1b [ 516.907009] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 516.912146] ? lock_downgrade+0x880/0x880 [ 516.916333] __should_failslab+0x121/0x190 [ 516.920597] should_failslab+0x9/0x14 [ 516.924435] __kmalloc_track_caller+0x2de/0x750 [ 516.929130] ? __lock_is_held+0xb6/0x140 [ 516.933218] ? btrfs_mount_root+0x362/0x18f0 [ 516.937654] kstrdup+0x3a/0x70 [ 516.938072] netlink: 1030 bytes leftover after parsing attributes in process `syz-executor.1'. [ 516.940865] btrfs_mount_root+0x362/0x18f0 [ 516.940899] ? btrfs_decode_error+0x70/0x70 [ 516.940917] ? rcu_read_lock_sched_held+0x110/0x130 [ 516.940931] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 516.940943] ? pcpu_alloc+0x144/0x12b0 [ 516.940968] ? pcpu_balance_workfn+0x1270/0x1270 [ 516.940986] ? __lockdep_init_map+0x10c/0x5b0 [ 516.941005] ? __lockdep_init_map+0x10c/0x5b0 [ 516.986536] mount_fs+0xa8/0x31f [ 516.989940] vfs_kern_mount.part.0+0x6f/0x410 [ 516.994474] vfs_kern_mount+0x40/0x60 [ 516.998369] btrfs_mount+0x2b4/0x15e2 [ 517.002216] ? kasan_check_write+0x14/0x20 [ 517.006470] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 517.011357] ? mark_held_locks+0xb1/0x100 [ 517.015562] ? check_preemption_disabled+0x48/0x290 [ 517.020606] ? btrfs_remount+0x1300/0x1300 [ 517.024858] ? rcu_read_lock_sched_held+0x110/0x130 [ 517.029879] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 517.035572] ? pcpu_alloc+0x144/0x12b0 [ 517.039470] ? pcpu_balance_workfn+0x1270/0x1270 [ 517.044227] ? __lockdep_init_map+0x10c/0x5b0 [ 517.048760] ? __lockdep_init_map+0x10c/0x5b0 [ 517.053275] mount_fs+0xa8/0x31f [ 517.056638] ? mount_fs+0xa8/0x31f [ 517.060177] vfs_kern_mount.part.0+0x6f/0x410 [ 517.064667] do_mount+0x53e/0x2bc0 [ 517.068200] ? retint_kernel+0x2d/0x2d [ 517.072091] ? copy_mount_string+0x40/0x40 [ 517.076319] ? copy_mount_options+0x198/0x3a0 [ 517.080810] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 517.085657] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 517.091189] ? copy_mount_options+0x280/0x3a0 [ 517.095691] ksys_mount+0xdb/0x150 [ 517.099227] __x64_sys_mount+0xbe/0x150 [ 517.103198] do_syscall_64+0xfd/0x620 [ 517.106993] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 517.112610] RIP: 0033:0x45d36a [ 517.115794] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 517.134714] RSP: 002b:00007eff745f6a68 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 517.142418] RAX: ffffffffffffffda RBX: 00007eff745f6c90 RCX: 000000000045d36a [ 517.149690] RDX: 00007eff745f6ae0 RSI: 00000000200001c0 RDI: 00007eff745f6b00 [ 517.156957] RBP: 000000000075bf20 R08: 00007eff745f6b40 R09: 00007eff745f6ae0 [ 517.164218] R10: 0000000000000000 R11: 0000000000000202 R12: 00007eff745f76d4 [ 517.171481] R13: 00000000004cacc7 R14: 00000000004e42e8 R15: 0000000000000003 16:06:32 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffff7f00000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:06:32 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0xc00}], 0x8000238, 0x0, 0x0) 16:06:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb7a41cb22da280000206000000a843096c37234a2e000900210008004b00ca8a9848a3090900006b7b31afdc1338d54400009b84136ef75afb83de441100d42c44e82afc5349fddd4ab94e7162", 0x55}], 0x1}, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5475, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xa1e2b55c0cbfeb01}, 0xc, &(0x7f0000000500)={&(0x7f00000002c0)={0x58, r2, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_AF={0x7, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000010}, 0x8000) 16:06:32 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0xdcc}], 0x8000238, 0x0, 0x0) [ 517.400153] netlink: 1030 bytes leftover after parsing attributes in process `syz-executor.1'. 16:06:33 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:33 executing program 4: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x107, 0x8, &(0x7f00000000c0), 0x4) 16:06:33 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0xdd4}], 0x8000238, 0x0, 0x0) 16:06:33 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) r2 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) r3 = open(&(0x7f0000000100)='./file0\x00', 0x2200, 0x40) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r3, &(0x7f0000000140)="0a400f705938041aac003462d36a7abd844f03f62e8344afc02ff6c425ac74384041e7d5cc67e3d5db7b078670dcf2c6618f3de2f8ae32302cc5b0bd6b10c0e000ca2bbfbdd7a1f26d2998af8e2448dd5e403ff2d73704da2252be6ac39a705b602abbd0de0f3143aef3a676828a94078b8859293ff89426f3ed8cf8bcbef477ca8537e3e28deffb0b2db9ebaa1150698bac95b9dc4e3ac8c4507dbe709a23a988fa686e91ee84e4d4f9e70fa0ff4c24a537e5b0a3e1abbd5874f532b5d0735adc72db6cc0c9e8e1", &(0x7f0000000240)=""/145}, 0x20) accept$ax25(r2, &(0x7f0000000080)={{0x3, @null}, [@netrom, @bcast, @remote, @rose, @remote, @remote, @null, @rose]}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$BLKGETSIZE(r7, 0x1260, &(0x7f0000000340)) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000040)={0x387e, 0x8}) 16:06:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:33 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0xe00}], 0x8000238, 0x0, 0x0) 16:06:33 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="60010000100013070000012b00000000ffffffff00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x28b}}, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000002c0)={0xffffffffffffffff}, 0x106, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r5, &(0x7f0000000340)={0xb, 0x10, 0xfa00, {&(0x7f0000000200), r10, 0x7ff}}, 0x18) 16:06:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='%trfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:33 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:06:33 executing program 4: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000980)="4c000000120081f87059ae08060c04000a006b10400103fe0500418701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f566da388", 0x4c}], 0x1}, 0x0) 16:06:33 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x1038}], 0x8000238, 0x0, 0x0) 16:06:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='b%rfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:34 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'\"ebug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:34 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @loopback}, 0x80, 0x0}, 0x0) 16:06:34 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x1050}], 0x8000238, 0x0, 0x0) 16:06:34 executing program 4: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x107, 0x13, &(0x7f00000000c0), 0x4) 16:06:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='bcrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:34 executing program 1: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) r2 = getuid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_ENUMINPUT(r5, 0xc050561a, &(0x7f0000000200)={0x8001, "39abf1937761e0ec9d94a8ff4ee4a0291edc4706f3d5c9994e67d474b1897d46", 0x3, 0xd, 0x3, 0xb700, 0x4000400, 0x4}) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='metacopy=on,xino=off,metacopy=off,xino=off,default_permissions,redirect_dir=./file0,redirect_dir=./file0,nfs_export=on,upperdir=./file0,redirect_dir=./file0,subj_type=cgroup,hash,smackfsdef=,subj_user=#^],euid>', @ANYRESDEC=r2, @ANYBLOB="2c666f77ef8d379880b7984454aeb19459c7fa8dbbe0279eb10e3c335c7440167e15e4a345fb8aef41caa9aed0de5b7ee5f948472b2ffc12424ecc385d8a333505b1208ecc5abc68a48fa89c", @ANYRESDEC=0x0, @ANYBLOB=',dont_hash,permit_directio,obj_type=cpusetuser,uid>', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r6, 0x80045006, &(0x7f0000000040)) ioctl$SNDCTL_DSP_GETISPACE(r6, 0x8010500d, &(0x7f0000000280)) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:06:34 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x1074}], 0x8000238, 0x0, 0x0) 16:06:34 executing program 4: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2, 0x0, 0x0, 0xc000000}}], 0x8000238, 0x0, 0x0) [ 518.956979] EXT4-fs (sda1): Unrecognized mount option ""ebug_want_extra_isize=0x00000000000007ff" or missing value [ 519.007145] overlayfs: unrecognized mount option "subj_type=cgroup" or missing value [ 519.133959] EXT4-fs (sda1): Unrecognized mount option ""ebug_want_extra_isize=0x00000000000007ff" or missing value 16:06:34 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 16:06:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btr.s\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:34 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x1400}], 0x8000238, 0x0, 0x0) 16:06:34 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0, 0xffffffffffffffb3}, 0x100000c0) 16:06:34 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:34 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={',ebug_want_extra_isize', 0x3d, 0x7ff}}]}) [ 519.500298] EXT4-fs (sda1): Unrecognized mount option "ebug_want_extra_isize=0x00000000000007ff" or missing value 16:06:35 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') getdents64(r2, &(0x7f0000000040)=""/13, 0xd) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:06:35 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x3810}], 0x8000238, 0x0, 0x0) 16:06:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btr/s\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 519.679952] EXT4-fs (sda1): Unrecognized mount option "ebug_want_extra_isize=0x00000000000007ff" or missing value 16:06:35 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x3f00}], 0x8000238, 0x0, 0x0) 16:06:35 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'d\"bug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:35 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x4000}], 0x8000238, 0x0, 0x0) [ 520.090891] EXT4-fs (sda1): Unrecognized mount option "d"bug_want_extra_isize=0x00000000000007ff" or missing value [ 520.223944] EXT4-fs (sda1): Unrecognized mount option "d"bug_want_extra_isize=0x00000000000007ff" or missing value 16:06:36 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'\nebug_want_extra_isize'}}]}) 16:06:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrf#\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:36 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:36 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x5010}], 0x8000238, 0x0, 0x0) 16:06:36 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'d%bug_want_extra_isize', 0x3d, 0x7ff}}]}) [ 520.653742] EXT4-fs (sda1): Unrecognized mount option "d%bug_want_extra_isize=0x00000000000007ff" or missing value 16:06:36 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x5865}], 0x8000238, 0x0, 0x0) [ 520.765603] EXT4-fs (sda1): Unrecognized mount option "d%bug_want_extra_isize=0x00000000000007ff" or missing value 16:06:36 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrf%\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 520.839537] EXT4-fs (sda1): Unrecognized mount option " [ 520.839537] ebug_want_extra_isize=0x0000000000000000" or missing value 16:06:36 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'d,bug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:36 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x6000}], 0x8000238, 0x0, 0x0) [ 520.960168] EXT4-fs (sda1): Unrecognized mount option " [ 520.960168] ebug_want_extra_isize=0x0000000000000000" or missing value 16:06:36 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'\"ebug_want_extra_isize'}}]}) 16:06:36 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x6558}], 0x8000238, 0x0, 0x0) 16:06:36 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrf*\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:37 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x7410}], 0x8000238, 0x0, 0x0) 16:06:37 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'%ebug_want_extra_isize'}}]}) 16:06:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrf+\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:37 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x8100}], 0x8000238, 0x0, 0x0) 16:06:37 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'de\"ug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:37 executing program 4 (fault-call:10 fault-nth:0): r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:37 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0xb402}], 0x8000238, 0x0, 0x0) 16:06:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrf-\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:37 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={',ebug_want_extra_isize'}}]}) [ 522.035770] FAULT_INJECTION: forcing a failure. [ 522.035770] name failslab, interval 1, probability 0, space 0, times 0 [ 522.086000] CPU: 0 PID: 20049 Comm: syz-executor.4 Not tainted 4.19.91-syzkaller #0 [ 522.093858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 522.103233] Call Trace: [ 522.105863] dump_stack+0x197/0x210 [ 522.109533] should_fail.cold+0xa/0x1b [ 522.113540] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 522.118673] ? lock_downgrade+0x880/0x880 [ 522.122865] __should_failslab+0x121/0x190 [ 522.127143] should_failslab+0x9/0x14 [ 522.130976] kmem_cache_alloc_trace+0x2cc/0x760 [ 522.135677] ? find_held_lock+0x35/0x130 [ 522.139768] alloc_pipe_info+0xbc/0x430 [ 522.143774] splice_direct_to_actor+0x76c/0x970 [ 522.148483] ? __inode_security_revalidate+0xda/0x120 [ 522.156575] ? generic_pipe_buf_nosteal+0x10/0x10 [ 522.161543] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 522.166599] ? selinux_file_permission+0x92/0x550 [ 522.171572] ? do_splice_to+0x180/0x180 [ 522.175589] ? security_file_permission+0x89/0x230 [ 522.180554] ? rw_verify_area+0x118/0x360 [ 522.184742] do_splice_direct+0x1da/0x2a0 [ 522.188933] ? splice_direct_to_actor+0x970/0x970 [ 522.193820] ? rcu_read_lock_sched_held+0x110/0x130 [ 522.199012] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 522.203794] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 522.209378] ? __sb_start_write+0x1a9/0x360 [ 522.213731] do_sendfile+0x597/0xce0 [ 522.217485] ? do_compat_pwritev64+0x1c0/0x1c0 [ 522.222095] ? fput+0x128/0x1a0 [ 522.225413] __x64_sys_sendfile64+0x1dd/0x220 [ 522.233157] ? __ia32_sys_sendfile+0x230/0x230 [ 522.237766] ? do_syscall_64+0x26/0x620 [ 522.241776] ? lockdep_hardirqs_on+0x415/0x5d0 [ 522.246392] ? trace_hardirqs_on+0x67/0x220 [ 522.250753] do_syscall_64+0xfd/0x620 [ 522.254595] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 522.259807] RIP: 0033:0x45a919 [ 522.263019] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:06:37 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0xcc0d}], 0x8000238, 0x0, 0x0) [ 522.281941] RSP: 002b:00007f3307dbfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 522.289675] RAX: ffffffffffffffda RBX: 00007f3307dbfc90 RCX: 000000000045a919 [ 522.296968] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000003 [ 522.304259] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 522.311550] R10: 00008000fffffffe R11: 0000000000000246 R12: 00007f3307dc06d4 [ 522.318884] R13: 00000000004c925e R14: 00000000004e0f88 R15: 0000000000000009 16:06:38 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0xd40d}], 0x8000238, 0x0, 0x0) 16:06:38 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'de%ug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrf.\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:38 executing program 4 (fault-call:10 fault-nth:1): r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:38 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x1a000}], 0x8000238, 0x0, 0x0) 16:06:38 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'d\nbug_want_extra_isize'}}]}) 16:06:38 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x34000}], 0x8000238, 0x0, 0x0) 16:06:38 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'de,ug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrf0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 523.049756] FAULT_INJECTION: forcing a failure. [ 523.049756] name failslab, interval 1, probability 0, space 0, times 0 16:06:38 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x40000}], 0x8000238, 0x0, 0x0) 16:06:38 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'d\"bug_want_extra_isize'}}]}) [ 523.099304] CPU: 1 PID: 20096 Comm: syz-executor.4 Not tainted 4.19.91-syzkaller #0 [ 523.107190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 523.116562] Call Trace: [ 523.119178] dump_stack+0x197/0x210 [ 523.122847] should_fail.cold+0xa/0x1b [ 523.126763] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 523.131890] ? lock_downgrade+0x880/0x880 [ 523.136066] __should_failslab+0x121/0x190 [ 523.140325] should_failslab+0x9/0x14 [ 523.144149] __kmalloc+0x2e2/0x750 [ 523.147710] ? kmem_cache_alloc_trace+0x348/0x760 [ 523.152583] ? alloc_pipe_info+0x19c/0x430 [ 523.156853] alloc_pipe_info+0x19c/0x430 [ 523.160940] splice_direct_to_actor+0x76c/0x970 [ 523.165632] ? __inode_security_revalidate+0xda/0x120 [ 523.170842] ? generic_pipe_buf_nosteal+0x10/0x10 [ 523.175707] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 523.180752] ? selinux_file_permission+0x92/0x550 [ 523.185623] ? do_splice_to+0x180/0x180 [ 523.189623] ? security_file_permission+0x89/0x230 [ 523.194581] ? rw_verify_area+0x118/0x360 [ 523.198758] do_splice_direct+0x1da/0x2a0 [ 523.202939] ? splice_direct_to_actor+0x970/0x970 [ 523.207807] ? rcu_read_lock_sched_held+0x110/0x130 [ 523.212845] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 523.217620] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 523.223183] ? __sb_start_write+0x1a9/0x360 [ 523.227534] do_sendfile+0x597/0xce0 [ 523.231287] ? do_compat_pwritev64+0x1c0/0x1c0 [ 523.235897] ? fput+0x128/0x1a0 [ 523.239235] __x64_sys_sendfile64+0x1dd/0x220 [ 523.243757] ? __ia32_sys_sendfile+0x230/0x230 [ 523.248370] ? do_syscall_64+0x26/0x620 [ 523.252383] ? lockdep_hardirqs_on+0x415/0x5d0 [ 523.256995] ? trace_hardirqs_on+0x67/0x220 [ 523.261356] do_syscall_64+0xfd/0x620 [ 523.265196] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 523.270411] RIP: 0033:0x45a919 [ 523.273633] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 523.292694] RSP: 002b:00007f3307dbfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 523.300425] RAX: ffffffffffffffda RBX: 00007f3307dbfc90 RCX: 000000000045a919 [ 523.307716] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000003 [ 523.315012] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 523.322304] R10: 00008000fffffffe R11: 0000000000000246 R12: 00007f3307dc06d4 [ 523.329596] R13: 00000000004c925e R14: 00000000004e0f88 R15: 0000000000000009 16:06:38 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x400300}], 0x8000238, 0x0, 0x0) 16:06:39 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'deb\"g_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:39 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0xa00100}], 0x8000238, 0x0, 0x0) 16:06:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfX\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:39 executing program 4 (fault-call:10 fault-nth:2): r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:39 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x1000000}], 0x8000238, 0x0, 0x0) 16:06:39 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'d%bug_want_extra_isize'}}]}) 16:06:39 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x2000000}], 0x8000238, 0x0, 0x0) 16:06:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfc\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 523.968627] FAULT_INJECTION: forcing a failure. [ 523.968627] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 523.997744] CPU: 1 PID: 20144 Comm: syz-executor.4 Not tainted 4.19.91-syzkaller #0 [ 524.000266] EXT4-fs: 20 callbacks suppressed [ 524.000277] EXT4-fs (sda1): Unrecognized mount option "d%bug_want_extra_isize=0x0000000000000000" or missing value [ 524.005587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 524.005622] Call Trace: [ 524.005645] dump_stack+0x197/0x210 [ 524.005666] should_fail.cold+0xa/0x1b [ 524.040059] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 524.045201] ? __might_sleep+0x95/0x190 [ 524.049212] __alloc_pages_nodemask+0x1ee/0x750 [ 524.053918] ? __alloc_pages_slowpath+0x2870/0x2870 [ 524.058971] ? find_held_lock+0x35/0x130 [ 524.063065] ? __do_page_cache_readahead+0x3f1/0x720 [ 524.068196] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 524.073911] alloc_pages_current+0x107/0x210 [ 524.078356] __page_cache_alloc+0x2bd/0x450 [ 524.082706] ? kasan_check_read+0x11/0x20 [ 524.086897] __do_page_cache_readahead+0x1ce/0x720 [ 524.091865] ? read_pages+0x610/0x610 [ 524.095692] ? page_cache_sync_readahead+0x1d3/0x520 [ 524.100837] ondemand_readahead+0x543/0xcd0 [ 524.105198] page_cache_sync_readahead+0x281/0x520 [ 524.110162] generic_file_read_iter+0x16b6/0x2b90 [ 524.115051] ? save_stack+0xa9/0xd0 [ 524.118707] ? kasan_kmalloc+0xce/0xf0 [ 524.122613] ? __kmalloc+0x15d/0x750 [ 524.126357] ? do_sendfile+0x597/0xce0 [ 524.130278] ? filemap_range_has_page+0x380/0x380 [ 524.135155] ? __lock_is_held+0xb6/0x140 [ 524.139255] ext4_file_read_iter+0x180/0x3c0 [ 524.143697] generic_file_splice_read+0x42c/0x750 [ 524.148576] ? add_to_pipe+0x350/0x350 [ 524.152494] ? __inode_security_revalidate+0xda/0x120 [ 524.157732] ? security_file_permission+0x89/0x230 [ 524.162698] ? rw_verify_area+0x118/0x360 [ 524.166882] ? add_to_pipe+0x350/0x350 [ 524.166902] do_splice_to+0x127/0x180 [ 524.166923] splice_direct_to_actor+0x2d3/0x970 [ 524.166944] ? generic_pipe_buf_nosteal+0x10/0x10 [ 524.184156] ? do_splice_to+0x180/0x180 [ 524.188161] ? security_file_permission+0x89/0x230 [ 524.188184] ? rw_verify_area+0x118/0x360 [ 524.188202] do_splice_direct+0x1da/0x2a0 [ 524.188226] ? splice_direct_to_actor+0x970/0x970 [ 524.206319] ? rcu_read_lock_sched_held+0x110/0x130 [ 524.211369] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 524.216259] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 524.221821] ? __sb_start_write+0x1a9/0x360 [ 524.226172] do_sendfile+0x597/0xce0 [ 524.229927] ? do_compat_pwritev64+0x1c0/0x1c0 [ 524.234541] ? fput+0x128/0x1a0 [ 524.237855] __x64_sys_sendfile64+0x1dd/0x220 [ 524.242381] ? __ia32_sys_sendfile+0x230/0x230 [ 524.246988] ? do_syscall_64+0x26/0x620 [ 524.251000] ? lockdep_hardirqs_on+0x415/0x5d0 [ 524.255620] ? trace_hardirqs_on+0x67/0x220 [ 524.259985] do_syscall_64+0xfd/0x620 [ 524.263947] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 524.269157] RIP: 0033:0x45a919 [ 524.272363] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 524.291294] RSP: 002b:00007f3307dbfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 524.299050] RAX: ffffffffffffffda RBX: 00007f3307dbfc90 RCX: 000000000045a919 [ 524.306341] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000003 16:06:39 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'deb#g_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:39 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x4000000}], 0x8000238, 0x0, 0x0) [ 524.313633] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 524.320926] R10: 00008000fffffffe R11: 0000000000000246 R12: 00007f3307dc06d4 [ 524.328223] R13: 00000000004c925e R14: 00000000004e0f88 R15: 0000000000000009 16:06:39 executing program 4 (fault-call:10 fault-nth:3): r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:39 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x6000000}], 0x8000238, 0x0, 0x0) [ 524.469968] EXT4-fs (sda1): Unrecognized mount option "d%bug_want_extra_isize=0x0000000000000000" or missing value 16:06:40 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'d,bug_want_extra_isize'}}]}) [ 524.590985] EXT4-fs (sda1): Unrecognized mount option "deb#g_want_extra_isize=0x00000000000007ff" or missing value 16:06:40 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x7000000}], 0x8000238, 0x0, 0x0) 16:06:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfd\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 524.633598] FAULT_INJECTION: forcing a failure. [ 524.633598] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 524.695417] CPU: 0 PID: 20165 Comm: syz-executor.4 Not tainted 4.19.91-syzkaller #0 [ 524.703275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 524.712787] Call Trace: [ 524.715435] dump_stack+0x197/0x210 [ 524.719094] should_fail.cold+0xa/0x1b [ 524.723016] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 524.728170] ? __might_sleep+0x95/0x190 [ 524.732175] __alloc_pages_nodemask+0x1ee/0x750 [ 524.736876] ? __alloc_pages_slowpath+0x2870/0x2870 [ 524.741918] ? find_held_lock+0x35/0x130 [ 524.746015] ? __do_page_cache_readahead+0x3f1/0x720 [ 524.751144] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 524.756706] alloc_pages_current+0x107/0x210 [ 524.761142] __page_cache_alloc+0x2bd/0x450 [ 524.765475] ? kasan_check_read+0x11/0x20 [ 524.769643] __do_page_cache_readahead+0x1ce/0x720 [ 524.774597] ? read_pages+0x610/0x610 [ 524.778412] ? page_cache_sync_readahead+0x1d3/0x520 [ 524.783539] ondemand_readahead+0x543/0xcd0 [ 524.787884] page_cache_sync_readahead+0x281/0x520 [ 524.792838] generic_file_read_iter+0x16b6/0x2b90 [ 524.797706] ? save_stack+0xa9/0xd0 [ 524.801356] ? kasan_kmalloc+0xce/0xf0 [ 524.805368] ? __kmalloc+0x15d/0x750 [ 524.809112] ? do_sendfile+0x597/0xce0 [ 524.813031] ? filemap_range_has_page+0x380/0x380 [ 524.817911] ? __lock_is_held+0xb6/0x140 [ 524.822005] ext4_file_read_iter+0x180/0x3c0 [ 524.826436] generic_file_splice_read+0x42c/0x750 [ 524.831298] ? add_to_pipe+0x350/0x350 [ 524.835222] ? __inode_security_revalidate+0xda/0x120 [ 524.840451] ? security_file_permission+0x89/0x230 [ 524.845402] ? rw_verify_area+0x118/0x360 [ 524.849566] ? add_to_pipe+0x350/0x350 [ 524.853471] do_splice_to+0x127/0x180 [ 524.857298] splice_direct_to_actor+0x2d3/0x970 [ 524.862008] ? generic_pipe_buf_nosteal+0x10/0x10 [ 524.866884] ? do_splice_to+0x180/0x180 [ 524.870877] ? security_file_permission+0x89/0x230 [ 524.875852] ? rw_verify_area+0x118/0x360 [ 524.880034] do_splice_direct+0x1da/0x2a0 [ 524.884204] ? splice_direct_to_actor+0x970/0x970 [ 524.889082] ? rcu_read_lock_sched_held+0x110/0x130 [ 524.894110] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 524.898879] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 524.904430] ? __sb_start_write+0x1a9/0x360 [ 524.909119] do_sendfile+0x597/0xce0 [ 524.913021] ? do_compat_pwritev64+0x1c0/0x1c0 [ 524.917649] ? fput+0x128/0x1a0 [ 524.920974] __x64_sys_sendfile64+0x1dd/0x220 [ 524.925500] ? __ia32_sys_sendfile+0x230/0x230 [ 524.930097] ? do_syscall_64+0x26/0x620 [ 524.934092] ? lockdep_hardirqs_on+0x415/0x5d0 [ 524.938695] ? trace_hardirqs_on+0x67/0x220 [ 524.943050] do_syscall_64+0xfd/0x620 [ 524.946875] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 524.952163] RIP: 0033:0x45a919 [ 524.955369] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 524.974346] RSP: 002b:00007f3307dbfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 524.982079] RAX: ffffffffffffffda RBX: 00007f3307dbfc90 RCX: 000000000045a919 [ 524.989498] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000003 [ 524.996824] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 525.004115] R10: 00008000fffffffe R11: 0000000000000246 R12: 00007f3307dc06d4 [ 525.011399] R13: 00000000004c925e R14: 00000000004e0f88 R15: 0000000000000009 16:06:40 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x8000000}], 0x8000238, 0x0, 0x0) 16:06:40 executing program 4 (fault-call:10 fault-nth:4): r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) [ 525.086064] EXT4-fs (sda1): Unrecognized mount option "deb#g_want_extra_isize=0x00000000000007ff" or missing value 16:06:40 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'deb%g_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:40 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x9000000}], 0x8000238, 0x0, 0x0) [ 525.195864] EXT4-fs (sda1): Unrecognized mount option "d" or missing value [ 525.215914] FAULT_INJECTION: forcing a failure. [ 525.215914] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 525.251952] CPU: 0 PID: 20183 Comm: syz-executor.4 Not tainted 4.19.91-syzkaller #0 [ 525.259812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 525.269182] Call Trace: [ 525.271808] dump_stack+0x197/0x210 [ 525.275472] should_fail.cold+0xa/0x1b [ 525.279385] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 525.284527] ? __might_sleep+0x95/0x190 [ 525.288631] __alloc_pages_nodemask+0x1ee/0x750 [ 525.293342] ? __alloc_pages_slowpath+0x2870/0x2870 [ 525.298403] ? find_held_lock+0x35/0x130 [ 525.302499] ? __do_page_cache_readahead+0x3f1/0x720 [ 525.307714] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 525.313337] alloc_pages_current+0x107/0x210 [ 525.317773] __page_cache_alloc+0x2bd/0x450 [ 525.322116] ? kasan_check_read+0x11/0x20 [ 525.326295] __do_page_cache_readahead+0x1ce/0x720 [ 525.331256] ? read_pages+0x610/0x610 [ 525.335077] ? page_cache_sync_readahead+0x1d3/0x520 [ 525.340221] ondemand_readahead+0x543/0xcd0 [ 525.344603] page_cache_sync_readahead+0x281/0x520 [ 525.349561] generic_file_read_iter+0x16b6/0x2b90 [ 525.354425] ? save_stack+0xa9/0xd0 [ 525.358070] ? kasan_kmalloc+0xce/0xf0 [ 525.361966] ? __kmalloc+0x15d/0x750 [ 525.365717] ? do_sendfile+0x597/0xce0 [ 525.369646] ? filemap_range_has_page+0x380/0x380 [ 525.374613] ? __lock_is_held+0xb6/0x140 [ 525.378794] ext4_file_read_iter+0x180/0x3c0 [ 525.383234] generic_file_splice_read+0x42c/0x750 [ 525.388101] ? add_to_pipe+0x350/0x350 [ 525.392004] ? __inode_security_revalidate+0xda/0x120 [ 525.397228] ? security_file_permission+0x89/0x230 [ 525.402181] ? rw_verify_area+0x118/0x360 [ 525.406355] ? add_to_pipe+0x350/0x350 [ 525.410260] do_splice_to+0x127/0x180 [ 525.414077] splice_direct_to_actor+0x2d3/0x970 [ 525.418791] ? generic_pipe_buf_nosteal+0x10/0x10 [ 525.423669] ? do_splice_to+0x180/0x180 [ 525.427661] ? security_file_permission+0x89/0x230 [ 525.432618] ? rw_verify_area+0x118/0x360 [ 525.436813] do_splice_direct+0x1da/0x2a0 [ 525.440987] ? splice_direct_to_actor+0x970/0x970 [ 525.445859] ? rcu_read_lock_sched_held+0x110/0x130 [ 525.450899] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 525.455679] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 525.461232] ? __sb_start_write+0x1a9/0x360 [ 525.465574] do_sendfile+0x597/0xce0 [ 525.469321] ? do_compat_pwritev64+0x1c0/0x1c0 [ 525.473926] ? fput+0x128/0x1a0 [ 525.477227] __x64_sys_sendfile64+0x1dd/0x220 [ 525.481742] ? __ia32_sys_sendfile+0x230/0x230 [ 525.486347] ? do_syscall_64+0x26/0x620 [ 525.490337] ? lockdep_hardirqs_on+0x415/0x5d0 [ 525.494937] ? trace_hardirqs_on+0x67/0x220 [ 525.499384] do_syscall_64+0xfd/0x620 [ 525.503204] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 525.508407] RIP: 0033:0x45a919 [ 525.511615] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 525.530527] RSP: 002b:00007f3307dbfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 525.538264] RAX: ffffffffffffffda RBX: 00007f3307dbfc90 RCX: 000000000045a919 [ 525.545564] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000003 16:06:40 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0xa000000}], 0x8000238, 0x0, 0x0) [ 525.552920] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 525.560206] R10: 00008000fffffffe R11: 0000000000000246 R12: 00007f3307dc06d4 [ 525.567484] R13: 00000000004c925e R14: 00000000004e0f88 R15: 0000000000000009 16:06:41 executing program 4 (fault-call:10 fault-nth:5): r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfi\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 525.670264] EXT4-fs (sda1): Unrecognized mount option "deb%g_want_extra_isize=0x00000000000007ff" or missing value 16:06:41 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0xc000000}], 0x8000238, 0x0, 0x0) [ 525.731958] EXT4-fs (sda1): Unrecognized mount option "d" or missing value [ 525.764471] FAULT_INJECTION: forcing a failure. [ 525.764471] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 525.817132] CPU: 1 PID: 20200 Comm: syz-executor.4 Not tainted 4.19.91-syzkaller #0 [ 525.824990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 525.834364] Call Trace: [ 525.836986] dump_stack+0x197/0x210 [ 525.840650] should_fail.cold+0xa/0x1b [ 525.844567] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 525.849713] ? __might_sleep+0x95/0x190 [ 525.853725] __alloc_pages_nodemask+0x1ee/0x750 [ 525.854446] EXT4-fs (sda1): Unrecognized mount option "deb%g_want_extra_isize=0x00000000000007ff" or missing value [ 525.858428] ? __alloc_pages_slowpath+0x2870/0x2870 [ 525.873971] ? find_held_lock+0x35/0x130 [ 525.878082] ? __do_page_cache_readahead+0x3f1/0x720 [ 525.883346] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 525.888928] alloc_pages_current+0x107/0x210 [ 525.893382] __page_cache_alloc+0x2bd/0x450 [ 525.897749] ? kasan_check_read+0x11/0x20 [ 525.902124] __do_page_cache_readahead+0x1ce/0x720 [ 525.907107] ? read_pages+0x610/0x610 [ 525.910943] ? page_cache_sync_readahead+0x1d3/0x520 [ 525.916088] ondemand_readahead+0x543/0xcd0 [ 525.920455] page_cache_sync_readahead+0x281/0x520 [ 525.925424] generic_file_read_iter+0x16b6/0x2b90 [ 525.930311] ? save_stack+0xa9/0xd0 [ 525.933969] ? kasan_kmalloc+0xce/0xf0 [ 525.937969] ? __kmalloc+0x15d/0x750 [ 525.941711] ? do_sendfile+0x597/0xce0 [ 525.945636] ? filemap_range_has_page+0x380/0x380 [ 525.950522] ? __lock_is_held+0xb6/0x140 [ 525.954627] ext4_file_read_iter+0x180/0x3c0 [ 525.959076] generic_file_splice_read+0x42c/0x750 [ 525.963956] ? add_to_pipe+0x350/0x350 [ 525.967876] ? __inode_security_revalidate+0xda/0x120 [ 525.973128] ? security_file_permission+0x89/0x230 [ 525.978103] ? rw_verify_area+0x118/0x360 [ 525.982277] ? add_to_pipe+0x350/0x350 [ 525.986198] do_splice_to+0x127/0x180 [ 525.990038] splice_direct_to_actor+0x2d3/0x970 [ 525.994758] ? generic_pipe_buf_nosteal+0x10/0x10 [ 525.999662] ? do_splice_to+0x180/0x180 [ 526.003675] ? security_file_permission+0x89/0x230 [ 526.008641] ? rw_verify_area+0x118/0x360 [ 526.012827] do_splice_direct+0x1da/0x2a0 [ 526.017014] ? splice_direct_to_actor+0x970/0x970 [ 526.021899] ? rcu_read_lock_sched_held+0x110/0x130 [ 526.026954] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 526.031742] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 526.037319] ? __sb_start_write+0x1a9/0x360 [ 526.041691] do_sendfile+0x597/0xce0 [ 526.045453] ? do_compat_pwritev64+0x1c0/0x1c0 [ 526.050068] ? fput+0x128/0x1a0 [ 526.053391] __x64_sys_sendfile64+0x1dd/0x220 [ 526.057919] ? __ia32_sys_sendfile+0x230/0x230 [ 526.062526] ? do_syscall_64+0x26/0x620 [ 526.066527] ? lockdep_hardirqs_on+0x415/0x5d0 [ 526.071144] ? trace_hardirqs_on+0x67/0x220 [ 526.075503] do_syscall_64+0xfd/0x620 [ 526.079333] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 526.084548] RIP: 0033:0x45a919 [ 526.087767] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 526.106804] RSP: 002b:00007f3307dbfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 526.114543] RAX: ffffffffffffffda RBX: 00007f3307dbfc90 RCX: 000000000045a919 [ 526.121864] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000003 [ 526.129160] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 526.136450] R10: 00008000fffffffe R11: 0000000000000246 R12: 00007f3307dc06d4 [ 526.143741] R13: 00000000004c925e R14: 00000000004e0f88 R15: 0000000000000009 16:06:41 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0xe000000}], 0x8000238, 0x0, 0x0) 16:06:41 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'de\nug_want_extra_isize'}}]}) 16:06:41 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'deb*g_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfl\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:41 executing program 4 (fault-call:10 fault-nth:6): r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:41 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x10000000}], 0x8000238, 0x0, 0x0) [ 526.396273] EXT4-fs (sda1): Unrecognized mount option "de [ 526.396273] ug_want_extra_isize=0x0000000000000000" or missing value [ 526.432427] FAULT_INJECTION: forcing a failure. [ 526.432427] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 526.489651] CPU: 0 PID: 20222 Comm: syz-executor.4 Not tainted 4.19.91-syzkaller #0 [ 526.497517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 526.506901] Call Trace: [ 526.506929] dump_stack+0x197/0x210 [ 526.506949] should_fail.cold+0xa/0x1b [ 526.506969] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 526.510273] EXT4-fs (sda1): Unrecognized mount option "deb*g_want_extra_isize=0x00000000000007ff" or missing value [ 526.513202] ? __might_sleep+0x95/0x190 [ 526.513231] __alloc_pages_nodemask+0x1ee/0x750 [ 526.513258] ? __alloc_pages_slowpath+0x2870/0x2870 [ 526.522258] ? find_held_lock+0x35/0x130 [ 526.522279] ? __do_page_cache_readahead+0x3f1/0x720 [ 526.522297] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 526.522317] alloc_pages_current+0x107/0x210 [ 526.522335] __page_cache_alloc+0x2bd/0x450 [ 526.522350] ? kasan_check_read+0x11/0x20 [ 526.522374] __do_page_cache_readahead+0x1ce/0x720 [ 526.579116] ? read_pages+0x610/0x610 [ 526.582938] ? page_cache_sync_readahead+0x1d3/0x520 [ 526.588065] ondemand_readahead+0x543/0xcd0 [ 526.592414] page_cache_sync_readahead+0x281/0x520 [ 526.597369] generic_file_read_iter+0x16b6/0x2b90 [ 526.602233] ? save_stack+0xa9/0xd0 [ 526.605879] ? kasan_kmalloc+0xce/0xf0 [ 526.609773] ? __kmalloc+0x15d/0x750 [ 526.613500] ? do_sendfile+0x597/0xce0 [ 526.617407] ? filemap_range_has_page+0x380/0x380 [ 526.622274] ? __lock_is_held+0xb6/0x140 [ 526.626360] ext4_file_read_iter+0x180/0x3c0 [ 526.630789] generic_file_splice_read+0x42c/0x750 [ 526.635670] ? add_to_pipe+0x350/0x350 [ 526.639576] ? __inode_security_revalidate+0xda/0x120 [ 526.644794] ? security_file_permission+0x89/0x230 [ 526.649738] ? rw_verify_area+0x118/0x360 [ 526.653987] ? add_to_pipe+0x350/0x350 [ 526.657889] do_splice_to+0x127/0x180 [ 526.661711] splice_direct_to_actor+0x2d3/0x970 [ 526.666397] ? generic_pipe_buf_nosteal+0x10/0x10 [ 526.671276] ? do_splice_to+0x180/0x180 [ 526.675274] ? security_file_permission+0x89/0x230 [ 526.680222] ? rw_verify_area+0x118/0x360 [ 526.684390] do_splice_direct+0x1da/0x2a0 [ 526.688571] ? splice_direct_to_actor+0x970/0x970 [ 526.693464] ? rcu_read_lock_sched_held+0x110/0x130 [ 526.698632] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 526.703413] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 526.708985] ? __sb_start_write+0x1a9/0x360 [ 526.713337] do_sendfile+0x597/0xce0 [ 526.717086] ? do_compat_pwritev64+0x1c0/0x1c0 [ 526.721691] ? fput+0x128/0x1a0 [ 526.724994] __x64_sys_sendfile64+0x1dd/0x220 [ 526.729514] ? __ia32_sys_sendfile+0x230/0x230 [ 526.734109] ? do_syscall_64+0x26/0x620 [ 526.738104] ? lockdep_hardirqs_on+0x415/0x5d0 [ 526.742705] ? trace_hardirqs_on+0x67/0x220 [ 526.747138] do_syscall_64+0xfd/0x620 [ 526.750966] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 526.756173] RIP: 0033:0x45a919 [ 526.759379] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 526.778290] RSP: 002b:00007f3307dbfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 16:06:42 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x14000000}], 0x8000238, 0x0, 0x0) [ 526.786013] RAX: ffffffffffffffda RBX: 00007f3307dbfc90 RCX: 000000000045a919 [ 526.793290] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000003 [ 526.800573] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 526.807854] R10: 00008000fffffffe R11: 0000000000000246 R12: 00007f3307dc06d4 [ 526.815176] R13: 00000000004c925e R14: 00000000004e0f88 R15: 0000000000000009 16:06:42 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x38100000}], 0x8000238, 0x0, 0x0) 16:06:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfo\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:42 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'de\"ug_want_extra_isize'}}]}) 16:06:42 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'deb+g_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:42 executing program 4 (fault-call:10 fault-nth:7): r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:42 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x3f000000}], 0x8000238, 0x0, 0x0) [ 527.232880] FAULT_INJECTION: forcing a failure. [ 527.232880] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 527.278520] CPU: 1 PID: 20254 Comm: syz-executor.4 Not tainted 4.19.91-syzkaller #0 [ 527.286376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 527.286394] Call Trace: [ 527.298378] dump_stack+0x197/0x210 [ 527.302048] should_fail.cold+0xa/0x1b [ 527.305978] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 527.311127] ? __might_sleep+0x95/0x190 [ 527.315237] __alloc_pages_nodemask+0x1ee/0x750 [ 527.319944] ? __alloc_pages_slowpath+0x2870/0x2870 [ 527.325006] ? find_held_lock+0x35/0x130 [ 527.329103] ? __do_page_cache_readahead+0x3f1/0x720 [ 527.334221] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 527.339946] alloc_pages_current+0x107/0x210 [ 527.344391] __page_cache_alloc+0x2bd/0x450 [ 527.344406] ? kasan_check_read+0x11/0x20 [ 527.344424] __do_page_cache_readahead+0x1ce/0x720 [ 527.344444] ? read_pages+0x610/0x610 [ 527.361794] ? page_cache_sync_readahead+0x1d3/0x520 [ 527.366942] ondemand_readahead+0x543/0xcd0 [ 527.371308] page_cache_sync_readahead+0x281/0x520 [ 527.376278] generic_file_read_iter+0x16b6/0x2b90 [ 527.381154] ? save_stack+0xa9/0xd0 [ 527.384824] ? kasan_kmalloc+0xce/0xf0 [ 527.388747] ? __kmalloc+0x15d/0x750 [ 527.392493] ? do_sendfile+0x597/0xce0 [ 527.396425] ? filemap_range_has_page+0x380/0x380 [ 527.401313] ? __lock_is_held+0xb6/0x140 [ 527.405549] ext4_file_read_iter+0x180/0x3c0 [ 527.410002] generic_file_splice_read+0x42c/0x750 [ 527.414873] ? add_to_pipe+0x350/0x350 [ 527.418879] ? __inode_security_revalidate+0xda/0x120 [ 527.424148] ? security_file_permission+0x89/0x230 [ 527.429124] ? rw_verify_area+0x118/0x360 [ 527.433317] ? add_to_pipe+0x350/0x350 [ 527.437223] do_splice_to+0x127/0x180 [ 527.441035] splice_direct_to_actor+0x2d3/0x970 [ 527.441053] ? generic_pipe_buf_nosteal+0x10/0x10 [ 527.441071] ? do_splice_to+0x180/0x180 [ 527.441128] ? security_file_permission+0x89/0x230 [ 527.441147] ? rw_verify_area+0x118/0x360 [ 527.441163] do_splice_direct+0x1da/0x2a0 [ 527.441180] ? splice_direct_to_actor+0x970/0x970 [ 527.441201] ? rcu_read_lock_sched_held+0x110/0x130 [ 527.441217] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 527.441232] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 527.441245] ? __sb_start_write+0x1a9/0x360 [ 527.441265] do_sendfile+0x597/0xce0 [ 527.496324] ? do_compat_pwritev64+0x1c0/0x1c0 [ 527.500936] ? fput+0x128/0x1a0 [ 527.504396] __x64_sys_sendfile64+0x1dd/0x220 [ 527.508935] ? __ia32_sys_sendfile+0x230/0x230 [ 527.513712] ? do_syscall_64+0x26/0x620 [ 527.517741] ? lockdep_hardirqs_on+0x415/0x5d0 [ 527.522360] ? trace_hardirqs_on+0x67/0x220 [ 527.526821] do_syscall_64+0xfd/0x620 [ 527.530663] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 527.535871] RIP: 0033:0x45a919 [ 527.539086] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 527.558115] RSP: 002b:00007f3307dbfc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 527.567843] RAX: ffffffffffffffda RBX: 00007f3307dbfc90 RCX: 000000000045a919 16:06:43 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x40000000}], 0x8000238, 0x0, 0x0) 16:06:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfp\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 527.575266] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000003 [ 527.582558] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 527.589856] R10: 00008000fffffffe R11: 0000000000000246 R12: 00007f3307dc06d4 [ 527.597277] R13: 00000000004c925e R14: 00000000004e0f88 R15: 0000000000000009 16:06:43 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x50100000}], 0x8000238, 0x0, 0x0) 16:06:43 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'de%ug_want_extra_isize'}}]}) 16:06:43 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x60000000}], 0x8000238, 0x0, 0x0) 16:06:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfu\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:43 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'deb,g_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:43 executing program 4 (fault-call:10 fault-nth:8): r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:43 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x65580000}], 0x8000238, 0x0, 0x0) 16:06:43 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x74100000}], 0x8000238, 0x0, 0x0) 16:06:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfx\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:43 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'de,ug_want_extra_isize'}}]}) 16:06:43 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x81000000}], 0x8000238, 0x0, 0x0) 16:06:43 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'deb-g_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:44 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x88a8ffff}], 0x8000238, 0x0, 0x0) 16:06:44 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x8000fffffffe) 16:06:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x02', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:44 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0xb4020000}], 0x8000238, 0x0, 0x0) 16:06:44 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'deb\ng_want_extra_isize'}}]}) 16:06:44 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0xcc0d0000}], 0x8000238, 0x0, 0x0) 16:06:44 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000002) 16:06:44 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'deb.g_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x03', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:44 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0xd40d0000}], 0x8000238, 0x0, 0x0) [ 529.044597] EXT4-fs: 15 callbacks suppressed [ 529.044612] EXT4-fs (sda1): Unrecognized mount option "deb [ 529.044612] g_want_extra_isize=0x0000000000000000" or missing value 16:06:44 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'deb\"g_want_extra_isize'}}]}) [ 529.169634] EXT4-fs (sda1): Unrecognized mount option "deb.g_want_extra_isize=0x00000000000007ff" or missing value 16:06:44 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0xffffa888}], 0x8000238, 0x0, 0x0) 16:06:44 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000003) 16:06:44 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x2, 0x0, 0x0) [ 529.350559] EXT4-fs (sda1): Unrecognized mount option "deb.g_want_extra_isize=0x00000000000007ff" or missing value 16:06:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x04', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:44 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'deb0g_want_extra_isize', 0x3d, 0x7ff}}]}) [ 529.471348] EXT4-fs (sda1): Unrecognized mount option "deb"g_want_extra_isize=0x0000000000000000" or missing value 16:06:45 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x3, 0x0, 0x0) 16:06:45 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000004) 16:06:45 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x4, 0x0, 0x0) [ 529.677428] EXT4-fs (sda1): Unrecognized mount option "deb"g_want_extra_isize=0x0000000000000000" or missing value 16:06:45 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x5, 0x0, 0x0) [ 529.760630] EXT4-fs (sda1): Unrecognized mount option "deb0g_want_extra_isize=0x00000000000007ff" or missing value 16:06:45 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'deb#g_want_extra_isize'}}]}) 16:06:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x05', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:45 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000005) [ 529.902560] EXT4-fs (sda1): Unrecognized mount option "deb0g_want_extra_isize=0x00000000000007ff" or missing value 16:06:45 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x6, 0x0, 0x0) 16:06:45 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debXg_want_extra_isize', 0x3d, 0x7ff}}]}) [ 530.058912] EXT4-fs (sda1): Unrecognized mount option "deb#g_want_extra_isize=0x0000000000000000" or missing value 16:06:45 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x7, 0x0, 0x0) 16:06:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x06', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:45 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000006) [ 530.237240] EXT4-fs (sda1): Unrecognized mount option "deb#g_want_extra_isize=0x0000000000000000" or missing value [ 530.289835] EXT4-fs (sda1): Unrecognized mount option "debXg_want_extra_isize=0x00000000000007ff" or missing value 16:06:45 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'deb%g_want_extra_isize'}}]}) 16:06:45 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8, 0x0, 0x0) 16:06:46 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000007) 16:06:46 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x9, 0x0, 0x0) 16:06:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\a', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:46 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debcg_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:46 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x2, 0x0) 16:06:46 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'deb*g_want_extra_isize'}}]}) 16:06:46 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000008) 16:06:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\t', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:46 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debdg_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x10', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:46 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'deb+g_want_extra_isize'}}]}) 16:06:46 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000009) 16:06:47 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debig_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\"', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:47 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000000a) 16:06:47 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'deb,g_want_extra_isize'}}]}) 16:06:49 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x4, 0x0) 16:06:49 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'deblg_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs#', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:49 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000000b) 16:06:49 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'deb-g_want_extra_isize'}}]}) [ 534.330142] EXT4-fs: 15 callbacks suppressed [ 534.330155] EXT4-fs (sda1): Unrecognized mount option "deb-g_want_extra_isize=0x0000000000000000" or missing value 16:06:49 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x6, 0x0) [ 534.410000] EXT4-fs (sda1): Unrecognized mount option "deblg_want_extra_isize=0x00000000000007ff" or missing value [ 534.520967] EXT4-fs (sda1): Unrecognized mount option "deb-g_want_extra_isize=0x0000000000000000" or missing value 16:06:50 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000000c) 16:06:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs,', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 534.590734] EXT4-fs (sda1): Unrecognized mount option "deblg_want_extra_isize=0x00000000000007ff" or missing value 16:06:50 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'deb.g_want_extra_isize'}}]}) 16:06:50 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debog_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsH', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 534.930154] EXT4-fs (sda1): Unrecognized mount option "deb.g_want_extra_isize=0x0000000000000000" or missing value 16:06:50 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000000d) [ 535.023186] EXT4-fs (sda1): Unrecognized mount option "debog_want_extra_isize=0x00000000000007ff" or missing value [ 535.122787] EXT4-fs (sda1): Unrecognized mount option "deb.g_want_extra_isize=0x0000000000000000" or missing value 16:06:50 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000000e) 16:06:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsL', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 535.249872] EXT4-fs (sda1): Unrecognized mount option "debog_want_extra_isize=0x00000000000007ff" or missing value 16:06:50 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'deb0g_want_extra_isize'}}]}) 16:06:50 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debpg_want_extra_isize', 0x3d, 0x7ff}}]}) [ 535.540928] EXT4-fs (sda1): Unrecognized mount option "deb0g_want_extra_isize=0x0000000000000000" or missing value 16:06:51 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000000f) [ 535.651123] EXT4-fs (sda1): Unrecognized mount option "debpg_want_extra_isize=0x00000000000007ff" or missing value 16:06:56 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x7, 0x0) 16:06:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsh', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:56 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debXg_want_extra_isize'}}]}) 16:06:56 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debsg_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:56 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000010) [ 540.736364] EXT4-fs: 2 callbacks suppressed [ 540.736380] EXT4-fs (sda1): Unrecognized mount option "debsg_want_extra_isize=0x00000000000007ff" or missing value 16:06:56 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x8, 0x0) [ 540.839626] EXT4-fs (sda1): Unrecognized mount option "debXg_want_extra_isize=0x0000000000000000" or missing value 16:06:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsl', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 540.938539] EXT4-fs (sda1): Unrecognized mount option "debsg_want_extra_isize=0x00000000000007ff" or missing value 16:06:56 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000011) 16:06:56 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x9, 0x0) [ 541.023832] EXT4-fs (sda1): Unrecognized mount option "debXg_want_extra_isize=0x0000000000000000" or missing value 16:06:56 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debxg_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:56 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debcg_want_extra_isize'}}]}) 16:06:56 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0xa, 0x0) 16:06:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfst', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 541.300556] EXT4-fs (sda1): Unrecognized mount option "debxg_want_extra_isize=0x00000000000007ff" or missing value 16:06:56 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000012) [ 541.372947] EXT4-fs (sda1): Unrecognized mount option "debcg_want_extra_isize=0x0000000000000000" or missing value [ 541.443152] EXT4-fs (sda1): Unrecognized mount option "debxg_want_extra_isize=0x00000000000007ff" or missing value 16:06:57 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debu\"_want_extra_isize', 0x3d, 0x7ff}}]}) [ 541.585684] EXT4-fs (sda1): Unrecognized mount option "debcg_want_extra_isize=0x0000000000000000" or missing value 16:06:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsz', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:57 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debdg_want_extra_isize'}}]}) [ 541.770347] EXT4-fs (sda1): Unrecognized mount option "debu"_want_extra_isize=0x00000000000007ff" or missing value 16:06:57 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000013) [ 541.932312] EXT4-fs (sda1): Unrecognized mount option "debu"_want_extra_isize=0x00000000000007ff" or missing value 16:06:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs~', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:06:57 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debu,_want_extra_isize', 0x3d, 0x7ff}}]}) 16:06:57 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000014) 16:06:57 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debig_want_extra_isize'}}]}) 16:06:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:00 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0xc, 0x0) 16:07:00 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug\"want_extra_isize', 0x3d, 0x7ff}}]}) 16:07:00 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000015) 16:07:00 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'deblg_want_extra_isize'}}]}) 16:07:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:00 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r1) fsetxattr(r1, &(0x7f0000000400)=@random={'system.', '/dev/vcsu#\x00'}, &(0x7f0000000440)='\xf3\x00', 0x2, 0x1) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r5, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000002c00)={r5, @in6={{0xa, 0x4e22, 0x1ff, @loopback}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000280)={r5, @in6={{0xa, 0x0, 0x1, @local, 0xbc5}}, 0x0, 0x3f, 0x0, 0xff, 0xf4ade3832108ff31}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000004c0)={r5, 0xfffffffb, 0x30}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r6 = socket$kcm(0x2, 0x2, 0x0) r7 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x5, 0x101100) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000040)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000080)={0x0, 0x0, 0x20}) ioctl$DRM_IOCTL_GEM_OPEN(r7, 0xc010640b, &(0x7f00000000c0)={r8, r9, 0x976}) r10 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) sendmmsg$nfc_llcp(r10, &(0x7f0000000340)=[{&(0x7f0000000100)={0x27, 0x1, 0x0, 0x3, 0x6, 0x1, "d8bf469efa49343b36abdb0db07a067976e89f8281a43a0324864d340c60e195d606597134d90a1f929d7b3096a81f15bdd22ea4e63979448274299f759f6b", 0x1d}, 0x60, &(0x7f0000000300)=[{&(0x7f0000000180)="0ed2f08749ecb2a3fcc5c25ad8bc5ea7962863ffbdb25047c015adac459aa0bad96e56ac0efb88eb22c494104078cf3281f08286eb342d5b5459", 0x3a}, {&(0x7f00000001c0)="9e9aee51a60336cf91c6d60ea44d81f6c21286072af29094a90157fe54ae", 0x1e}, {&(0x7f0000000200)="18e73ddeae2e2f56b07db385831ba5ef5bf5473ad9521733fd1ae27695c66c9e2a94e82dfb69539c14af0cea756de6df9a1717ffb0bdb7891349a8ded8f587ba53fe4c161005ec2a90879db1aa85a47c9805bfac07e21f797180272451d703af233f9b113cd03361ddff58b6835798c92c7c4b33034344413d23cac55884dac5227037c053ade661f27a3a7c2386e2d3f8f1d7b293ac7641d78a5182a507a047c6a0bc9f058d5df8df38cf730e53eb00bdbfa3e468823cddae1496ee4693db77b7d40523afadbf3d6e60ac2a8dde85176dd18bfc1ed34d6e6f139116429bb59441f63c735654e25b380225", 0xeb}], 0x3, 0x0, 0x0, 0x8000}], 0x1, 0x8420) sendmsg$kcm(r6, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:07:00 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0xe, 0x0) 16:07:00 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$IMGETCOUNT(0xffffffffffffffff, 0x80044943, &(0x7f00000000c0)) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x3, 0x1, 0x4, 0x4000, 0x6, {0x77359400}, {0x3, 0x0, 0x40, 0x80, 0x1, 0x3, "ffd072f0"}, 0x7, 0x2, @fd=r4, 0x7fffffff, 0x0, r0}) openat(r5, &(0x7f0000000080)='./file0\x00', 0xc02c0, 0x29) 16:07:00 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000016) 16:07:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:00 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debog_want_extra_isize'}}]}) 16:07:00 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug,want_extra_isize', 0x3d, 0x7ff}}]}) 16:07:00 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xfffffca0, 0x0, 0xfffffffffffffc28, 0x0, 0xfffffffffffffe18}, 0x2) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x2) mmap$snddsp(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x100010, r2, 0x1000) 16:07:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:00 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000017) 16:07:00 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debpg_want_extra_isize'}}]}) 16:07:00 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_\"ant_extra_isize', 0x3d, 0x7ff}}]}) 16:07:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:02 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x10, 0x0) 16:07:02 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000018) 16:07:02 executing program 1: r0 = socket$kcm(0x2b, 0x5, 0x0) syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0xfffffffffffffffd, 0x92ac2ee13ea60acf) r1 = accept(r0, &(0x7f00000001c0)=@generic, &(0x7f0000000240)=0x80) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000280)=0x200, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x21000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000100)={'raw\x00'}, &(0x7f0000000180)=0x54) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x2, 0x2000) connect$caif(r3, &(0x7f0000000040), 0x18) r4 = shmat(0xffffffffffffffff, &(0x7f0000ffc000/0x1000)=nil, 0x3000) shmdt(r4) shmdt(r4) r5 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@isdn={0x22, 0x5, 0x1, 0x9, 0x1}, 0x80, 0x0}, 0x814) 16:07:02 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debsg_want_extra_isize'}}]}) 16:07:02 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_,ant_extra_isize', 0x3d, 0x7ff}}]}) 16:07:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsS', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 547.479461] EXT4-fs: 18 callbacks suppressed [ 547.479473] EXT4-fs (sda1): Unrecognized mount option "debug_" or missing value 16:07:03 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x14, 0x0) [ 547.555149] EXT4-fs (sda1): Unrecognized mount option "debsg_want_extra_isize=0x0000000000000000" or missing value 16:07:03 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x9, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468000000e1801fed9e7ff2420048ea908ee378b374b4e4ae281b45b2c2dcebd97a0a3468ced201d398dc8bc05170e624154142b6699a933149c19c51c47e7b06669c80bb92af2c0119944538d864e8cee68949029e655eae8535943d2d0d0d84f01bc78be7dcbf709e57e66d0b0faa763bed8d94af99dd188534e9254ca99c50bfcd0201f8e43fc380f63e28c11c809b7060bba0e96b62fd5b65de7c74bc3bb3c56eaeaf20a8030c22f7670cdd0010a01006e40d58134b379b07a38ff2cc19290b91655ef36e48ebb3eded1e2e492316c31c79482f1d461ff760efd4dd200abe5b0b2f6e4dde5a7438efdd7b6cd4af982c51627823da954ebf06aefdf802c947d2d60c3e", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x8, 0x2, @multicast1}, @IFA_FLAGS={0x8, 0x3}]}, 0x28}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', r4}) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x800) r5 = socket$kcm(0x2, 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup3(r7, r6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$KVM_SET_VCPU_EVENTS(r8, 0x4040aea0, &(0x7f0000000140)={0x6, 0x3, 0x89, 0x0, 0x4, 0x9, 0x2, 0x6, 0x6, 0x81, 0x80, 0x9, 0x0, 0x5, 0x3ff, 0x2f, 0x5, 0x3f, 0x80, [], 0x9, 0x5}) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000240)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000001740)=[{&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="6f623a4bf578215109b6d322b83eaa535e984d6995d7e19378bed634e4ccd78d996307a0ecbfd1f5e2808b8317f6bec118cd5335c8ee57866d4774e91c4b292e8ae3f66e24a53504637f3cae98164288f43951d15e4c3107e743b34472e2fe4b5263e9e095dfa9efd90a9d7d09d8960832d79a39bf18e2bf63a256f5f7841c8a405ad403c1c0045c7c412c08d30d9a94c4e92b81807a609f20734ddb7c8f6ee488ac68dfa948932a4d07c881c12876f5e6e926d122ab75a2d939ace8ae1ffd92a3702e64310aa53d66", 0xc9}, {&(0x7f00000002c0)="ebc1f982d8a981db4bba872e6c5e5a8b2b36788341840162b76b74cd1c74a09a6486705814c0313562d96425b1cfb8f3a39ce9625e82637c3012071b", 0x3c}, {&(0x7f0000001580)="1ea7734cd2b9d54b9938e80323c0c7e289207a7614bed40bb9dac624500306dff243b700d5acdbcfe83c48639458136f4390dfdabffe52a742e6c2a6bd6b71895c50d03a21cbe45631159dfc38146e272c2c792a179e91eb741df0651d88915a7f1de6571ee7c446b6ad4ab3039295a06f022e60d0bc1459eec663268d5d7ec31b567581", 0x84}, {&(0x7f0000001640)="2747751c14fcc4bd0c98780a23781bef691056d89e3b4d61aecc0610c54b987175ab02e3e47ceec0427e373598befa698bd6b46f79b36d3f47071abb05addf55f9dbe72bf956b5a4ac36662cdd4889c53101d586241ab7de910c9fe34aaadbcf9b99736c4369844074ba3227222502c030db22c0752d50c4053cb365490b7e6061b25ef9c4d4b9cd723e59399b4dc66dc73676a1c99c631d974fe2c33782590b5b6d194f8b13c82d2688fc4e6ecb8bf733d40fb1b9d1a7bcd0a31a54c1d8ffc3", 0xc0}, {&(0x7f0000000300)="eb61fd564a1b58411d99aa84052f4ba937ef05eee790e06ad7cc88afecfa804bff83dedc5ec6", 0x26}, {&(0x7f0000001700)}], 0x7, &(0x7f00000018c0)=ANY=[@ANYBLOB="6800000000000000000000000700000044246072ac1e0001000000040000000200000006000000ff7f0000010001000100000020892b08ac1414aa0000000000000000000007f9ac1e01017f000001ac1414160000000000000001ac1414aa9406000000000000003000000000000000000000000700000094060100000000000000000901890b047f000001e0000001830780e000000100a9c2865b4679075b6e13d98e1da88769c88b0e6ca6838bbc2c96ad73d66aa1"], 0x98}, 0x7425c6b11930a78d) 16:07:03 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000019) [ 547.659860] EXT4-fs (sda1): Unrecognized mount option "debug_" or missing value [ 547.674656] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 16:07:03 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x60, 0x0) 16:07:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:03 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_w\"nt_extra_isize', 0x3d, 0x7ff}}]}) [ 547.726239] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 547.755559] EXT4-fs (sda1): Unrecognized mount option "debsg_want_extra_isize=0x0000000000000000" or missing value 16:07:03 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debxg_want_extra_isize'}}]}) 16:07:03 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x2b4, 0x0) 16:07:03 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@ipx={0x4, 0x7fff, 0x1, "00b1fc5af7e3", 0x5}, 0x80, 0x0, 0x29b}, 0x48004080) 16:07:03 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x600, 0x0) [ 547.983109] EXT4-fs (sda1): Unrecognized mount option "debug_w"nt_extra_isize=0x00000000000007ff" or missing value 16:07:03 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x4000) socket(0x8, 0x800, 0x5) 16:07:03 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000001a) 16:07:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:03 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x700, 0x0) [ 548.104333] EXT4-fs (sda1): Unrecognized mount option "debug_w"nt_extra_isize=0x00000000000007ff" or missing value 16:07:03 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x2, 0x40580) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000080)=@gcm_256={{0x303}, "2e64a2b2a4d2fef5", "22c9157bbece64cf09268f88e7caae618bf1f232f05ca5be591aab9933d7da6c", "ee8c9c94", "bd055237d5e877e2"}, 0x38) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SG_SET_TIMEOUT(r5, 0x2201, &(0x7f0000000000)=0x7fffffff) socket$vsock_dgram(0x28, 0x2, 0x0) [ 548.183948] EXT4-fs (sda1): Unrecognized mount option "debxg_want_extra_isize=0x0000000000000000" or missing value 16:07:03 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_w%nt_extra_isize', 0x3d, 0x7ff}}]}) [ 548.289078] EXT4-fs (sda1): Unrecognized mount option "debxg_want_extra_isize=0x0000000000000000" or missing value 16:07:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:03 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x900, 0x0) 16:07:03 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debu\n_want_extra_isize'}}]}) 16:07:03 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x2c, r3, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz1\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2010004}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r3, 0x0, 0x70bd27, 0x25dfdbfb, {{}, {}, {0x14, 0x18, {0x3, @bearer=@l2={'eth', 0x3a, 'bond0\x00'}}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x4c080}, 0x80) ioctl$sock_rose_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000000)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1389, @bcast, @bpq0='bpq0\x00', 0x3, [@bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:07:03 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000001b) [ 548.438393] EXT4-fs (sda1): Unrecognized mount option "debug_w%nt_extra_isize=0x00000000000007ff" or missing value 16:07:04 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0xa00, 0x0) 16:07:04 executing program 1: keyctl$session_to_parent(0x12) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x2, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x400, 0xce48cd85aeb174a5) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0, 0x0, 0x0, 0x24}, 0x0) [ 548.537692] EXT4-fs (sda1): Unrecognized mount option "debug_w%nt_extra_isize=0x00000000000007ff" or missing value 16:07:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:04 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000001c) 16:07:04 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_w,nt_extra_isize', 0x3d, 0x7ff}}]}) 16:07:04 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:07:04 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0xc00, 0x0) 16:07:04 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debu\"_want_extra_isize'}}]}) 16:07:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:04 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000001d) 16:07:04 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) socket$kcm(0x2, 0x2, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r1) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:07:04 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0xdcc, 0x0) 16:07:04 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000001e) 16:07:04 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0xdd4, 0x0) 16:07:04 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORUNLOCK(r3, 0x5381) r4 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:07:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:04 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_wa\"t_extra_isize', 0x3d, 0x7ff}}]}) 16:07:04 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debu,_want_extra_isize'}}]}) 16:07:04 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0xe00, 0x0) 16:07:04 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_PCM_IOCTL_TTSTAMP(r1, 0x40044103, &(0x7f0000000200)=0x3ff) r2 = socket$kcm(0x2, 0x2, 0x0) r3 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) r4 = accept4$inet(r3, &(0x7f0000000000)={0x2, 0x0, @initdev}, &(0x7f0000000040)=0x10, 0x800) r5 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r6 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r6, r5) fcntl$setstatus(r6, 0x4, 0x200) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/167, 0xa7, 0x80000000, &(0x7f0000000180)={0x2, 0x4e22, @rand_addr=0xfff}, 0x10) 16:07:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:04 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000021) 16:07:05 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x1038, 0x0) 16:07:05 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000000)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, 0x0}, 0x0) 16:07:05 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x1050, 0x0) 16:07:05 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r1) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0x200, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}, @in={0x2, 0x4e22, @remote}, @in={0x2, 0x4e22, @remote}], 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) r4 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000040)) ioctl$PPPIOCSMRU(r4, 0x40047452, &(0x7f0000000000)=0x7) 16:07:05 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug\nwant_extra_isize'}}]}) 16:07:05 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_wa,t_extra_isize', 0x3d, 0x7ff}}]}) 16:07:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:05 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000022) 16:07:05 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x1074, 0x0) 16:07:05 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0}, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r2) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r5 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r5, r4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={r4}) r6 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r6, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) r7 = socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000140)) r8 = syz_open_dev$vcsu(&(0x7f0000000180)='/dev/vcsu#\x00', 0x7, 0x2) setsockopt$sock_linger(r8, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0xe95}, 0x8) r9 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r7, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x2c, r9, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz1\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r6, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xe62b19f6528268c}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r9, 0x0, 0x70bd2c, 0x25dfdbfc, {{}, {}, {0x14, 0x18, {0x1, @bearer=@udp='udp:syz0\x00'}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x40) 16:07:05 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x1400, 0x0) 16:07:05 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_wan\"_extra_isize', 0x3d, 0x7ff}}]}) 16:07:05 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug\"want_extra_isize'}}]}) 16:07:05 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000023) 16:07:05 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x104000, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xff) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="24000000030207081dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e24, @multicast1}, 0x80, 0x0}, 0x4c850) 16:07:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:05 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x3810, 0x0) 16:07:05 executing program 1: r0 = socket$kcm(0x2b, 0x9, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000040)={&(0x7f00000000c0)=@tipc=@name={0x1e, 0x2, 0x3, {{0x1, 0x3}, 0x2}}, 0x80, &(0x7f0000001800)=[{&(0x7f0000000140)="5cfd3b75ac8805c7c6d4b74b4181fbc6f85ff194066dd593f7fbcd333e8651f568573de895968db0f1453f7af915a42cba6cb0293e2fc7fa898c089222a5997a00ca2087ed0aeede11775e45afedfc133fedaeb4767c814094f2a5277e5f133f68131709360f8021e03eac4aebd020d68ee137618eac8e", 0x77}, {&(0x7f00000001c0)="9d12b6a775fdafce74bcce97368328a82c31c7c3fed0df511e100c297e8e5d8f015391026a37eaf868cee99222cf628106ff502068608394dfaf70bac4e63980dabc58c53b94a9a656e379706d06a9f2b7ca424d132b05e5bfa740c604d03b57e55bbea8c9147583c2207cb6f429bc90ed25b659dd9c871f6e707daeb80348c429534add01f597ea8075acb068d5c92ac199d96b374d53cd87b3e449e2230cb49b7145cf6ab8f26df60600e534bd27c693855d9540fcf0d8e2f40e6d296242f7984805d82a930e36efca6d8951c1000b7d9f8f5b2b1c206d49c796e329aa2c33309614", 0xe3}, {&(0x7f00000002c0)="c50dc1a50597a32ba8b7534a4412c3d40e2b178922ecb6a08b2cf1da3113666e920684cd319d8ff4c5d6f32cb1f95cf44c3b82a6528c2647e89135ee5a59e18670023f1623ddac68f6ad2dcf64d8", 0x4e}, {&(0x7f00000004c0)="c812df627ceb47c40dbb21aa71895dc9e47578860540a526cb2ac6bbfe833b624896ec32fae9c256731708433044d977da522dd2b147887a1f037c1341985e9252b59f9c257babd47b2e8d14735814f363c32b9e0862c7addb29b5af0f1a077bbd3ba36cdeeaa7583458a13790ae261e25cd6f1c9cb94194ab11db09e6a6b1a11da9b2a3464b3920a629dabad619b812265d9839", 0x94}, {&(0x7f0000000580)="8401cebdd308bcfe1234327de3b5624e6c77250ab7a7d387195ce2f54f9babf07fe47e721710ac93adb7a1c713da2a9a2776ea92d095072b2c4b14ad1faf9ca8e6caa6ebefd53f20db432fc3fcf9981880cd6815d24a735dbe6cc370b1406b37be46d7e4dc566d20731eb7b693a41d415b9cd4ab2e77176399acd248eee29ecb867158a6f1ca47173f004504241599f588c3dee06e30fc330ad7056484687d116b83a4decb4201242a95ea5f57503fa4177c73947f7e788357fa219e31bef5dd2dda7a7fad7dd4dba9d31234e563ef9c488898827beaa4c4add2a0b413dae593990ffe9a", 0xe4}, {&(0x7f0000000680)="b40cdecc0e35216df4997906d084d2fa1c35643d2668986f07ca0dcbe0339773a1d78097db47f1c4cda8ad54189bd4fe53e892aade2e4b8a2b782d11ff75eef52654a10fc73f32bfb7a41a55c44281c99f00a3bea2ac47985260bafb47271091f8030e40221a4812de9f7e12acc41a694d57ca0e9c4d4dbb9824fe6df771fd6794cb08335954dbeb976aefdcebca77a5332e35c3bc4d36cfc6f8aee619bef14c258fb135f534a48329f8784b89b95739da1dc3cd77a1b30a5fcb7cf0", 0xbc}, {&(0x7f0000000740)="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", 0x1000}, {&(0x7f0000001740)="f2f1de0570dc8311ee78467d5df5e23430efb666d6b30af4a5d423c547e8e95f2e90499212896e42f2040d369a684f0f69d4aa2019e813e2f4e74a590d80290d6c7766630ad5d51e322c075ca2d707b27b4c9bae86d3e026207edca496d5e0a4a640020b58d0d4c9b67037006af3bcfab64a3c16eac7f36ff608af034f83d89b698f4be76fced7393d36e18506de13e341e3d319a58ccf2020af656ad41cbd8b815c6830a09bf89cfce8e2", 0xab}], 0x8, &(0x7f0000001880)=[{0xe0, 0x105, 0x2, "91570d6525cec3cc875c021bcf8b5707113c5f4f6a089919477bd4615364196b02764332d6fbc811b2af30a8814acba8a3d3ce791f3f202e996bb9b2af263989113d8f4217d537b34ced0dac6f26a8e4b710fbbec0f2d6ea9648d75ce3df8eced8aecb6613b72df1416a8bdea64709b8a29261aca65b4659de18235c5215d5d2e3f3249d9f5dc56852fba23ddf2d3293621d5c08f2bed8e24fd2dbba781f8e1ad7319b93cf8331fcbdc307d28f3e3689789038b8b14d3102755ae1a30d950c6fbca27c7e6752d73818c3a28ab0"}, {0x110, 0x114, 0x3f, "69e14a54ec17e23f1cee781698b88719d28b497ca4db46d93f75031a7b472e1746fc8424d153d7030cb49253fe38ab98111ff0de54d54960fe5520cb1be6e3a739b59c9fc8907d0f370a2b24a6da386999bb7823bfcc21a7a18b5a011120ea20e34cbe0ba13e3560033f63ddefa1f9651a92247b692cfa18216bd51e62439145e1e44c5dd97672d52454e51fddc6d4fa9434a39bc1c46ed5a73f4d31abb8d7104d2c8dd52f7134290ba4f17fd217b70970c13adde9fcb2417af5bad0350549434145f8a55c5118df5a110c118a69cbd32ed74b96fc307d931daef988b1b862ec732add869933dc5e9c5680a09bac6093bfecf32c7cd8fe73cad9"}], 0x1f0}, 0xe5647f404135e6f6) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r4 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r4, r3) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000340)={0x0, 'syz_tun\x00', {0x4}, 0xfc0}) write$apparmor_exec(r2, &(0x7f00000000c0)=ANY=[], 0x0) 16:07:06 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x3f00, 0x0) 16:07:06 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000024) 16:07:06 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_wan%_extra_isize', 0x3d, 0x7ff}}]}) 16:07:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x0e', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:06 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x4000, 0x0) 16:07:06 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug,want_extra_isize'}}]}) 16:07:06 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$cgroup_ro(r4, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) read$usbmon(r5, &(0x7f0000000040)=""/111, 0x6f) 16:07:06 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000025) 16:07:06 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x5010, 0x0) 16:07:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:06 executing program 1: socket$can_raw(0x1d, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) socket$kcm(0x2, 0x2, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0xc4000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000000c0)={0x3ff, 0x1ff, 0x1, 'queue0\x00', 0xfe}) sendmsg$kcm(r0, &(0x7f0000000180)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:07:06 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_wan,_extra_isize', 0x3d, 0x7ff}}]}) 16:07:06 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_\nant_extra_isize'}}]}) 16:07:06 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x5865, 0x0) 16:07:06 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f00000000c0)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x0, 0xc, 0x1, 0x9}, {0x41e, 0x4, 0xe4, 0x50c}]}, 0x10) dup2(r3, r2) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000000)=""/156) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @rand_addr=0xfffffffe}, 0x2, 0x4, 0x1, 0x6}}, 0xffffffffffffffd1, 0x0, 0x0, 0x0, 0x10c}, 0x0) 16:07:06 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000026) 16:07:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:06 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x6000, 0x0) 16:07:07 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x6558, 0x0) 16:07:07 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000027) 16:07:07 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000400)={0x0, 0xfb, 0x1015, 0x4, 0x11, "9af98324f37e26ae2f43762460cab300", "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"}, 0x1015, 0x1) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000000000)={0x4, 0x81, 0x400, 0x7, 0x4, "c0ebf6b3cea30c9d"}) 16:07:07 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_\"ant_extra_isize'}}]}) 16:07:07 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x7410, 0x0) 16:07:07 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want\"extra_isize', 0x3d, 0x7ff}}]}) 16:07:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:07 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) r2 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x80000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCADDRT(r3, 0x890b, &(0x7f00000000c0)={0x0, @vsock={0x28, 0x0, 0x2711}, @vsock={0x28, 0x0, 0xffffffff, @local}, @generic={0x1a, "e747f5219b6b8f1ede9c9c1045db"}, 0x3f, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000080)='sit0\x00', 0xffffffffffff0001, 0x800, 0xa00}) timer_create(0x5, &(0x7f0000000400)={0x0, 0x1f, 0x0, @thr={&(0x7f0000000180)="1133c0804624bf299574c625fe24af23ba72831ace34a6cde59f4f818318624ac634c00eed1156e72cf045b10c54dd180e6859e1079e914f901a8107bbb39a985260867cf0a455d8eaba5b18de9513f4ca95d9efdbb334e0ead2eeabc31df3455509a54b50852d3386ac3f49944560eda1fc818bf58a9d1b1ec9cc49ff111921ccc8d837926e79107e2cb09625a1d82162e641388439ebef157f98f4a1c3d9b6015f55102f4b6c08a8e5a1760205e9e473894a6502e63b13e170b526891a4dc2a17ca413298140", &(0x7f0000000280)="d59c63433519fac43bf1ea24cfb3d2f63a9da793c3f135f15b1b290b2e5f71ee60650a1f7a77856ceed2c6af05e0f973cee9c1dd91b2b7cc00d3d81eccc638fec8f2b466cabe330e2a7768c1901a97aa50d81fe7c70a50070a56b4c0a300c4f65860acbbe3ceead25187a722cc2bccf38317a4049b34165bae172d91b34f91c1e37402b657935066a5e403bc9cdf061fe5e7f5a0c30e14cf65af87e12fe8ac2a5bce7ffb9aa181899fb2161521837f0753f3608c0def30f2abc029c4eb999ce9f8072e4a67970d1be3adc89ce0efdf3ea63adee3a5527d0d5ed7881fb7e173a22730ab4f4808bef9"}}, &(0x7f0000000440)=0x0) timer_delete(r4) r5 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) r6 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r6, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r6, 0x84, 0x71, &(0x7f0000000480)={0x0, 0x4}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f0000000500)={r7, 0x100}, 0x8) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000140)={'vxcan0\x00'}) 16:07:07 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x8100, 0x0) 16:07:07 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000028) 16:07:07 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0xb402, 0x0) 16:07:07 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(r1, 0xc0186419, &(0x7f0000000180)={0x2, &(0x7f0000000040)=""/4, &(0x7f0000000140)=[{0x800, 0x34, 0x9, &(0x7f0000000080)=""/52}, {0x9, 0x74, 0x4, &(0x7f00000000c0)=""/116}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:07:07 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_,ant_extra_isize'}}]}) 16:07:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:07 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want,extra_isize', 0x3d, 0x7ff}}]}) 16:07:07 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000029) 16:07:07 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) r2 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) recvfrom$netrom(r2, &(0x7f0000000000)=""/193, 0xc1, 0x0, 0x0, 0x0) 16:07:07 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) r2 = accept(r1, &(0x7f0000000000)=@ax25={{0x3, @netrom}, [@bcast, @bcast, @rose, @rose, @default, @remote, @remote, @default]}, &(0x7f0000000080)=0x80) bind$bt_rfcomm(r2, &(0x7f00000000c0)={0x1f, {0x20, 0x7, 0xe9, 0x20, 0x2, 0x7f}, 0x40}, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:07:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x01', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:07 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_w\nnt_extra_isize'}}]}) 16:07:07 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000002a) 16:07:07 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_\"xtra_isize', 0x3d, 0x7ff}}]}) [ 552.597258] EXT4-fs: 34 callbacks suppressed [ 552.597272] EXT4-fs (sda1): Unrecognized mount option "debug_w [ 552.597272] nt_extra_isize=0x0000000000000000" or missing value [ 552.679813] EXT4-fs (sda1): Unrecognized mount option "debug_want_"xtra_isize=0x00000000000007ff" or missing value [ 552.783979] EXT4-fs (sda1): Unrecognized mount option "debug_w [ 552.783979] nt_extra_isize=0x0000000000000000" or missing value [ 552.844815] EXT4-fs (sda1): Unrecognized mount option "debug_want_"xtra_isize=0x00000000000007ff" or missing value 16:07:09 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0xcc0d, 0x0) 16:07:09 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r4, 0x40505412, &(0x7f0000000000)={0x4, 0x6, 0xb4bb, 0x0, 0x6}) 16:07:09 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000002b) 16:07:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\xc0', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:09 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_w\"nt_extra_isize'}}]}) 16:07:09 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_%xtra_isize', 0x3d, 0x7ff}}]}) 16:07:10 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0xd40d, 0x0) [ 554.495961] EXT4-fs (sda1): Unrecognized mount option "debug_want_%xtra_isize=0x00000000000007ff" or missing value 16:07:10 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r2, 0xc0305615, &(0x7f0000001140)={0x0, {0x7, 0x8001}}) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000001100)={0x1, 'batadv0\x00', {}, 0x81}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$kcm(0x2, 0x2, 0x0) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r5 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r5, r4) r6 = socket$can_raw(0x1d, 0x3, 0x1) r7 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r7, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc, 0x0, 0x0, 0x7}, 0x10) recvmmsg(r7, &(0x7f0000000f80)=[{{&(0x7f0000000000)=@un=@abs, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)=""/72, 0x48}, {&(0x7f0000000100)=""/83, 0x53}], 0x2, &(0x7f00000001c0)=""/245, 0xf5}, 0xc1}, {{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000002c0)=""/117, 0x75}, {&(0x7f00000004c0)=""/126, 0x7e}, {&(0x7f0000000540)=""/188, 0xbc}, {&(0x7f0000000600)=""/112, 0x70}, {&(0x7f0000000340)=""/39, 0x27}, {&(0x7f0000000680)=""/165, 0xa5}, {&(0x7f0000000740)=""/186, 0xba}], 0x7, &(0x7f0000000880)=""/104, 0x68}, 0x7fffffff}, {{&(0x7f0000000900)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000980)=""/201, 0xc9}], 0x1, &(0x7f0000000a80)=""/253, 0xfd}, 0x800}, {{&(0x7f0000000b80)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000c00)=""/207, 0xcf}, {&(0x7f0000000d00)=""/235, 0xeb}, {&(0x7f0000000e00)}], 0x3, &(0x7f0000000e80)=""/204, 0xcc}, 0x7fff}], 0x4, 0x1, &(0x7f0000001080)={0x77359400}) syz_open_dev$vcsn(&(0x7f00000010c0)='/dev/vcs#\x00', 0x3f, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000001180)={'team0\x00', r8}) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @local}, 0x80, 0x0}, 0x0) r9 = socket(0x1, 0x1, 0x3) setsockopt$packet_tx_ring(r9, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r10 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r10, r9) ioctl$sock_inet_udp_SIOCINQ(r9, 0x541b, &(0x7f0000000e00)) [ 554.579624] EXT4-fs (sda1): Unrecognized mount option "debug_w"nt_extra_isize=0x0000000000000000" or missing value 16:07:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x0f', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:10 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x1a000, 0x0) 16:07:10 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000002c) [ 554.660208] EXT4-fs (sda1): Unrecognized mount option "debug_want_%xtra_isize=0x00000000000007ff" or missing value 16:07:10 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) r2 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) r3 = accept4$ax25(r2, &(0x7f0000000000)={{0x3, @netrom}, [@netrom, @bcast, @remote, @bcast, @remote, @rose, @bcast, @default]}, &(0x7f0000000080)=0x48, 0x80800) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f00000000c0)={'bcsf0\x00', 0x486}) [ 554.744781] EXT4-fs (sda1): Unrecognized mount option "debug_w"nt_extra_isize=0x0000000000000000" or missing value 16:07:10 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x34000, 0x0) 16:07:10 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_,xtra_isize', 0x3d, 0x7ff}}]}) 16:07:10 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_w%nt_extra_isize'}}]}) 16:07:10 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000000)={0x3ff, [0x7fff, 0xffffffff], 0x8000}, 0x10) r2 = socket$kcm(0x2b, 0x2, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x2000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$kcm(0x2, 0x5, 0x0) r4 = socket(0x1e, 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x1500e0, 0x100) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) ioctl$IMCLEAR_L2(r4, 0x80044946, &(0x7f0000000040)=0x4) r5 = socket(0x1e, 0x0, 0x0) ioctl$KVM_IRQ_LINE(r3, 0x4008ae61, &(0x7f0000000180)={0x8, 0x800}) socketpair(0x1, 0x0, 0xfa, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_buf(r6, 0x0, 0x30, &(0x7f0000000200)="de7e5bea266d758808104740bb8615b83457442d1d2c2c84530e7ddd11c028c5a1c62af6ea46a2472dfd8d9f21289bcae18b69fdaa76159b850543664d0fd79f1947d57215daebb1b019af04eccd6d57acdf82592884045a468d5fae1aa5107757759b7b295166fdd14713a4c89b0f024c5b43153aec8949308000f73df1d1e03c0c15e0cb846f99460ab06dbf86486c26f80651af0900cd2731bd450969c716957cca67d9b9f9e7790255f1f19c2930c13f6488145e4d5cc5731595", 0xbc) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000000140)=@req3={0x100, 0x495, 0xeb2, 0x3, 0x0, 0x8000, 0x2}, 0x1c) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e22, @multicast2}, 0x2e8, 0x0, 0x0, 0x0, 0xfffffffffffffcfb}, 0x50) 16:07:10 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x40000, 0x0) 16:07:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 555.042031] EXT4-fs (sda1): Unrecognized mount option "debug_want_" or missing value 16:07:10 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000002d) 16:07:10 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x400300, 0x0) [ 555.114957] EXT4-fs (sda1): Unrecognized mount option "debug_w%nt_extra_isize=0x0000000000000000" or missing value 16:07:10 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x7, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000000)={0xc816, 0x5, 0x4, 0x400000, 0x1, {0x77359400}, {0x3, 0x0, 0xfd, 0x7f, 0x5, 0xb7, "2885b1cf"}, 0xffff0000, 0x1, @userptr=0x6, 0x5, 0x0, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000080), 0x4) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) r3 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) fsetxattr$security_ima(r3, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "28e9ace07faa7dfe77a168bf1aa73e3d1371eec0"}, 0x122, 0x2) 16:07:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:10 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_e\"tra_isize', 0x3d, 0x7ff}}]}) 16:07:10 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0xa00100, 0x0) 16:07:10 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_w,nt_extra_isize'}}]}) 16:07:10 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000002e) 16:07:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\xff', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:11 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r5 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r5, r4) setsockopt$RXRPC_SECURITY_KEYRING(r4, 0x110, 0x2, &(0x7f0000000000)='ppp1securitybdev\\\\@securitywbdevvboxnet0selinux\x00', 0x30) r6 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) mmap$usbfs(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000000, 0x2010, r6, 0x5) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:07:11 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x1000000, 0x0) 16:07:11 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_e,tra_isize', 0x3d, 0x7ff}}]}) 16:07:11 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x2000000, 0x0) 16:07:11 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000002f) 16:07:11 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x20) 16:07:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:11 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x4000000, 0x0) 16:07:11 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_wa\nt_extra_isize'}}]}) 16:07:11 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) r2 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) connect$bt_sco(r2, &(0x7f0000000040)={0x1f, {0x1f, 0x20, 0xc1, 0x4, 0x9, 0x3f}}, 0x8) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000000)={0x1f}) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:07:11 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x6000000, 0x0) 16:07:11 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_ex\"ra_isize', 0x3d, 0x7ff}}]}) 16:07:11 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000030) 16:07:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsk', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:11 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_GET_EMULATED_CPUID(r4, 0xc008ae09, &(0x7f0000000000)=""/99) 16:07:11 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x7000000, 0x0) 16:07:11 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_wa\"t_extra_isize'}}]}) 16:07:11 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) r2 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000380)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x4}, [@default, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, 0x0, 0x0, 0x0, 0x3d4}, 0x48000) 16:07:11 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000031) 16:07:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:11 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x8000000, 0x0) 16:07:11 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_ex%ra_isize', 0x3d, 0x7ff}}]}) 16:07:11 executing program 1: socket$kcm(0x2b, 0x1, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x200000, 0x0) write$FUSE_POLL(r1, &(0x7f0000000080)={0x18, 0xb760c90148ff1e97, 0x4}, 0x18) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000380)=@in={0x2, 0x4e23, @remote}, 0x80, 0x0}, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r2) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x18c00}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, r4, 0x620, 0x70bd28, 0x25dfdbfc, {{}, {}, {0x4c, 0x18, {0x80, @media='udp\x00'}}}, ["", "", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) sendmsg$nl_crypto(r2, &(0x7f00000002c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=@get={0x108, 0x13, 0x100, 0x70bd27, 0x25dfdbfc, {{'blake2b-512\x00'}, [], [], 0x2800, 0x2000}, [{0x8, 0x1, 0x5}, {0x8, 0x1, 0x7}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x9}, {0x8, 0x1, 0x1}]}, 0x108}, 0x1, 0x0, 0x0, 0x4000}, 0x5274c46711c2e1fe) 16:07:12 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x9000000, 0x0) 16:07:12 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000032) 16:07:12 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0xa000000, 0x0) 16:07:12 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_wa%t_extra_isize'}}]}) 16:07:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:12 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmget$private(0x0, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000000)=""/106) r2 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:07:12 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000033) 16:07:12 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0xc000000, 0x0) 16:07:12 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x2, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003d00)={&(0x7f0000000380)=@isdn={0x22, 0xa, 0x0, 0x8, 0x7}, 0xca097991defe35ca, 0x0, 0x0, 0x0, 0x1bc}, 0x0) 16:07:12 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_ex,ra_isize', 0x3d, 0x7ff}}]}) 16:07:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:12 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0xe000000, 0x0) 16:07:12 executing program 1: r0 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f0000000000)={0x6, 'syz0\x00'}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$tipc(0x1e, 0x2, 0x0) getsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r3 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) 16:07:12 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000034) 16:07:12 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_wa,t_extra_isize'}}]}) 16:07:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000000)=""/163, 0xa3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x130, 0x0, 0x0, 0x800e00558) shutdown(r1, 0x0) readv(r2, &(0x7f0000000380)=[{&(0x7f0000000140)=""/140, 0x8c}, {0x0}, {0x0}, {0x0}], 0x4) shutdown(r2, 0x0) 16:07:12 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x10000000, 0x0) 16:07:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:12 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x14000000, 0x0) 16:07:12 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000035) 16:07:12 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x38100000, 0x0) 16:07:12 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_ext\"a_isize', 0x3d, 0x7ff}}]}) 16:07:13 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_wan\n_extra_isize'}}]}) 16:07:13 executing program 1: 16:07:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:13 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x3f000000, 0x0) 16:07:13 executing program 1: 16:07:13 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000036) 16:07:13 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x40000000, 0x0) [ 557.684969] EXT4-fs: 22 callbacks suppressed [ 557.684983] EXT4-fs (sda1): Unrecognized mount option "debug_want_ext"a_isize=0x00000000000007ff" or missing value 16:07:13 executing program 1: 16:07:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 557.789780] EXT4-fs (sda1): Unrecognized mount option "debug_wan [ 557.789780] _extra_isize=0x0000000000000000" or missing value 16:07:13 executing program 1: 16:07:13 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x50100000, 0x0) [ 557.869609] EXT4-fs (sda1): Unrecognized mount option "debug_want_ext"a_isize=0x00000000000007ff" or missing value [ 557.939504] EXT4-fs (sda1): Unrecognized mount option "debug_wan [ 557.939504] _extra_isize=0x0000000000000000" or missing value 16:07:13 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_ext,a_isize', 0x3d, 0x7ff}}]}) 16:07:13 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_wan\"_extra_isize'}}]}) 16:07:13 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000037) 16:07:13 executing program 1: 16:07:13 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x60000000, 0x0) 16:07:13 executing program 1: 16:07:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:13 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x65580000, 0x0) [ 558.220044] EXT4-fs (sda1): Unrecognized mount option "debug_want_ext" or missing value 16:07:13 executing program 1: 16:07:13 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000038) [ 558.270037] EXT4-fs (sda1): Unrecognized mount option "debug_wan"_extra_isize=0x0000000000000000" or missing value [ 558.309930] EXT4-fs (sda1): Unrecognized mount option "debug_want_ext" or missing value 16:07:13 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x74100000, 0x0) 16:07:13 executing program 1: [ 558.390437] EXT4-fs (sda1): Unrecognized mount option "debug_wan"_extra_isize=0x0000000000000000" or missing value 16:07:13 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extr\"_isize', 0x3d, 0x7ff}}]}) 16:07:14 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_wan%_extra_isize'}}]}) 16:07:14 executing program 1: 16:07:14 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x81000000, 0x0) 16:07:14 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000039) 16:07:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 558.627912] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr"_isize=0x00000000000007ff" or missing value 16:07:14 executing program 1: 16:07:14 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x88a8ffff, 0x0) [ 558.699509] EXT4-fs (sda1): Unrecognized mount option "debug_wan%_extra_isize=0x0000000000000000" or missing value 16:07:14 executing program 1: 16:07:14 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0xb4020000, 0x0) 16:07:14 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000003a) 16:07:14 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extr%_isize', 0x3d, 0x7ff}}]}) 16:07:14 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0xcc0d0000, 0x0) 16:07:14 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_wan,_extra_isize'}}]}) 16:07:14 executing program 1: 16:07:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:14 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000003b) 16:07:14 executing program 1: 16:07:14 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0xd40d0000, 0x0) 16:07:14 executing program 1: 16:07:14 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0xffffa888, 0x0) 16:07:14 executing program 1: 16:07:14 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extr,_isize', 0x3d, 0x7ff}}]}) 16:07:14 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x4000000000000, 0x0) 16:07:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:14 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want\nextra_isize'}}]}) 16:07:14 executing program 1: 16:07:14 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000003c) 16:07:14 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x40030000000000, 0x0) 16:07:15 executing program 1: 16:07:15 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0xa0010000000000, 0x0) 16:07:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:15 executing program 1: 16:07:15 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000003d) 16:07:15 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra\"isize', 0x3d, 0x7ff}}]}) 16:07:15 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x100000000000000, 0x0) 16:07:15 executing program 1: 16:07:15 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want\"extra_isize'}}]}) 16:07:15 executing program 1: 16:07:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:15 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x200000000000000, 0x0) 16:07:15 executing program 1: 16:07:15 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000003e) 16:07:15 executing program 1: 16:07:15 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x400000000000000, 0x0) 16:07:15 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra,isize', 0x3d, 0x7ff}}]}) 16:07:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:15 executing program 1: 16:07:15 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x600000000000000, 0x0) 16:07:15 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want,extra_isize'}}]}) 16:07:15 executing program 1: 16:07:15 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x700000000000000, 0x0) 16:07:15 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000041) 16:07:15 executing program 1: 16:07:15 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x800000000000000, 0x0) 16:07:15 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_\"size', 0x3d, 0x7ff}}]}) 16:07:15 executing program 1: 16:07:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:16 executing program 1: 16:07:16 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x900000000000000, 0x0) 16:07:16 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000042) 16:07:16 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_\nxtra_isize'}}]}) 16:07:16 executing program 1: 16:07:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:16 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0xa00000000000000, 0x0) 16:07:16 executing program 1: 16:07:16 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_,size', 0x3d, 0x7ff}}]}) 16:07:16 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0xc00000000000000, 0x0) 16:07:16 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000043) 16:07:16 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0xe00000000000000, 0x0) 16:07:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:16 executing program 1: 16:07:16 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_\"xtra_isize'}}]}) 16:07:16 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x1000000000000000, 0x0) 16:07:16 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000980)="4c000000130081f87059ae08060c04000a006b10400103fe0500418701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f566da388", 0x4c}], 0x1}, 0x0) 16:07:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000cc0)=""/73, 0x49}], 0x1}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x10000040c, 0x0, 0x0, 0x800e0086e) shutdown(r1, 0x0) dup(0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) 16:07:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:16 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000044) 16:07:16 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_i\"ize', 0x3d, 0x7ff}}]}) 16:07:16 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x1400000000000000, 0x0) 16:07:16 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x3810000000000000, 0x0) 16:07:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000240)=""/246, 0xf6}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r0, 0x0) setsockopt$sock_timeval(r1, 0xffff, 0x1006, &(0x7f0000000000)={0x6}, 0x10) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0a01ae0000006c653000"], 0xa) recvfrom$inet(r1, 0x0, 0xfffffe44, 0x0, 0x0, 0x800e00521) shutdown(r1, 0x0) 16:07:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:17 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_%xtra_isize'}}]}) 16:07:17 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x3f00000000000000, 0x0) 16:07:17 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000045) 16:07:17 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_i#ize', 0x3d, 0x7ff}}]}) 16:07:17 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x4000000000000000, 0x0) 16:07:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:17 executing program 1: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x1, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:07:17 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_,xtra_isize'}}]}) 16:07:17 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x5010000000000000, 0x0) 16:07:17 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000046) 16:07:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:17 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_i%ize', 0x3d, 0x7ff}}]}) 16:07:17 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x6000000000000000, 0x0) 16:07:17 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000047) 16:07:17 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x6558000000000000, 0x0) 16:07:17 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_e\ntra_isize'}}]}) 16:07:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:17 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x7410000000000000, 0x0) 16:07:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904054865160b001700020a0000740004140e00110002000000dc2976d153b4", 0x235}], 0x1}, 0x0) 16:07:18 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_i*ize', 0x3d, 0x7ff}}]}) 16:07:18 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000048) 16:07:18 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x8100000000000000, 0x0) 16:07:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:18 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_e\"tra_isize'}}]}) [ 563.048353] EXT4-fs: 38 callbacks suppressed [ 563.048366] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i*ize=0x00000000000007ff" or missing value 16:07:18 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x88a8ffff00000000, 0x0) 16:07:18 executing program 1: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000044) [ 563.159490] EXT4-fs (sda1): Unrecognized mount option "debug_want_e"tra_isize=0x0000000000000000" or missing value 16:07:18 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0xb402000000000000, 0x0) 16:07:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 563.240534] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i*ize=0x00000000000007ff" or missing value 16:07:18 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000049) [ 563.323500] EXT4-fs (sda1): Unrecognized mount option "debug_want_e"tra_isize=0x0000000000000000" or missing value 16:07:18 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_i+ize', 0x3d, 0x7ff}}]}) 16:07:18 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmget$private(0x0, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000000)=""/106) r2 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) 16:07:18 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_e,tra_isize'}}]}) 16:07:18 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0xcc0d000000000000, 0x0) 16:07:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:19 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmget$private(0x0, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000000)=""/106) r2 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) [ 563.539429] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i+ize=0x00000000000007ff" or missing value 16:07:19 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0xd40d000000000000, 0x0) 16:07:19 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000004a) 16:07:19 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0xffffffff00000000, 0x0) 16:07:19 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmget$private(0x0, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000000)=""/106) r2 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) [ 563.665360] EXT4-fs (sda1): Unrecognized mount option "debug_want_e" or missing value [ 563.760174] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i+ize=0x00000000000007ff" or missing value [ 563.811675] EXT4-fs (sda1): Unrecognized mount option "debug_want_e" or missing value 16:07:19 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmget$private(0x0, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000000)=""/106) socket$kcm(0x2, 0x2, 0x0) 16:07:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:19 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_i,ize', 0x3d, 0x7ff}}]}) 16:07:19 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)}}], 0x1, 0x0, 0x0) 16:07:19 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_ex\nra_isize'}}]}) 16:07:19 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000004b) 16:07:19 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmget$private(0x0, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000000)=""/106) 16:07:19 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) 16:07:19 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) fcntl$dupfd(r1, 0x203, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40), 0x422, 0x0, 0x0) [ 564.063548] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i" or missing value 16:07:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\xff', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 564.135375] EXT4-fs (sda1): Unrecognized mount option "debug_want_ex [ 564.135375] ra_isize=0x0000000000000000" or missing value 16:07:19 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000004c) 16:07:19 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) r2 = getpid() sendmsg$nl_netfilter(r1, &(0x7f0000001280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200012}, 0xc, &(0x7f0000001240)={&(0x7f0000001180)={0xa8, 0xe, 0x7, 0xe13, 0x70bd27, 0x25dfdbfb, {0x6, 0x0, 0x7}, [@nested={0x10, 0x61, [@typed={0x8, 0x16, @str='\x00'}, @typed={0x4, 0x5}]}, @typed={0x4, 0x58}, @generic="bb4cb596384985e6df0726fa7e9ea1449d1d19b9b2d7895c740c74b2ba709ee8b0a36ff1a164cdf3fa937deed86d3574da1bc00f578f6fc4f82362788d84b58ddeb60c544ce0b6e8d324213a5352b6ef3f575a25536b535752634c13d7ed4f3a80a01a119eaa", @typed={0x4, 0x56}, @nested={0xc, 0x4c, [@typed={0x8, 0x28, @pid=r2}]}, @typed={0x8, 0x13, @fd=r0}]}, 0xa8}, 0x1, 0x0, 0x0, 0x800}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) 16:07:19 executing program 1: socket$kcm(0x2b, 0x1, 0x0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) 16:07:19 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x18d082, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r6, 0xc034564b, &(0x7f0000001180)={0x9, 0x30385056, 0x400, 0x7, 0x2, @discrete={0xfffffffd, 0xff}}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x100000a9}}], 0x80005c6, 0x0, 0x0) 16:07:19 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_i-ize', 0x3d, 0x7ff}}]}) 16:07:19 executing program 1: socket$kcm(0x2b, 0x1, 0x0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) 16:07:19 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_ex\"ra_isize'}}]}) 16:07:20 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000004d) 16:07:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:20 executing program 0: r0 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f00000012c0)={@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @bcast]}) r1 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) writev(r4, &(0x7f0000001280)=[{&(0x7f0000001180)="d235f1f5a57b34d818cc946bc653db710c8ea06f913894c7ca5620e5d5e4b280ae5de648f22dbb2e00eff44e5e13aacec1b958ea97baf36b51069e6c912f1a45abde204ce5bc7e6d6dad50670169750249b28f4ed8430bd96888f1df212bfa9a00c379b4be5210060c1f271b3f9a60e9daccde401a4e27766b21baeeb308a51445336e04e69b9a9c9eb252cd8f57dc12fe7b81efd0f5973e72047885fa2076440c7246fa07eea4932f3524bf319434f10f63cba0f7659d516e06dd4f4d3067094d8239028991a8db5dd84517a1b9dae0322e86016aaf3b0e02", 0xd9}], 0x1) sendto(r1, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) prctl$PR_GET_FP_MODE(0x2e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000002340)='./file0\x00', 0x2004, 0x80) r6 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r6, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r7 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r7, r6) r8 = socket(0x1e, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000002380)='/dev/sequencer2\x00', 0x400, 0x0) setsockopt$packet_tx_ring(r8, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) r9 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r9, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) r10 = dup3(r5, r9, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$GIO_SCRNMAP(r10, 0x4b40, &(0x7f0000001340)=""/4096) recvmmsg(r1, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) 16:07:20 executing program 1: socket$kcm(0x2b, 0x1, 0x0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) 16:07:20 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0xfffffffffffff5a9) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) 16:07:20 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000004e) 16:07:20 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) 16:07:20 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_ex%ra_isize'}}]}) 16:07:20 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_i.ize', 0x3d, 0x7ff}}]}) 16:07:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\xff', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:20 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) 16:07:20 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r4 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r4, r3) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000080)={0x20024e, 0x20000000209, 0x0, 0xffffffffffffffff}) r6 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r6, 0xc0184900, &(0x7f0000000080)={0x10000, 0x20000000209, 0x0, 0xffffffffffffffff}) r8 = dup2(r6, r7) r9 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='\x00d\x05\x00\x00\x00n\x00', 0x8000, 0x0) r10 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r10, 0xc0184900, &(0x7f0000000080)={0x10000, 0x20000000209, 0x0, 0xffffffffffffffff}) r12 = dup2(r10, r11) ioctl$ION_IOC_ALLOC(r12, 0xc0184900, &(0x7f0000000080)={0x20024e, 0x20000000209, 0x0, 0xffffffffffffffff}) r14 = dup2(r9, r13) ioctl$ION_IOC_ALLOC(r14, 0xc0184900, &(0x7f0000000000)={0x9cf0000008, 0x9, 0x0, 0xffffffffffffffff, 0x8}) r15 = socket(0x10, 0x80002, 0x0) r16 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/dlm_plock\x00', 0x800, 0x0) r17 = socket$inet6(0xa, 0x3, 0x6) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8, 0x810, r17, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r17, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r17, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) connect$inet6(r17, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) r18 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r17, r18, &(0x7f0000000240)=0x202, 0x4000000000dc) r19 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') ioctl$KVM_S390_UCAS_UNMAP(r18, 0x4018ae51, &(0x7f00000000c0)={0x8000, 0x7ff, 0x2}) sendmsg$NBD_CMD_RECONFIGURE(r18, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r19, @ANYBLOB="050c27bd7000ffdbdf2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x8040) sendmsg$NBD_CMD_CONNECT(r16, &(0x7f0000000e40)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x81800004}, 0xc, &(0x7f0000000e00)={&(0x7f0000000dc0)={0x14, r19, 0x800, 0x70bd28, 0x25dfdbfc}, 0x14}}, 0x10) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400040}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r19, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x80}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x2000c040) sendmsg$NBD_CMD_DISCONNECT(r15, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x22048002}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r19, 0x88, 0x70bd2d, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x6000081) r20 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) r21 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r21, 0xc0184900, &(0x7f0000000080)={0x10000, 0x20000000209, 0x0, 0xffffffffffffffff}) r23 = dup2(r21, r22) ioctl$ION_IOC_ALLOC(r23, 0xc0184900, &(0x7f0000000080)={0x20024b, 0x20000000209, 0x0, 0xffffffffffffffff}) r25 = dup2(r20, r24) ioctl$ION_IOC_ALLOC(r25, 0xc0184900, &(0x7f0000000000)={0x9cf0000008, 0x9, 0x0, 0xffffffffffffffff, 0x8}) r26 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) r27 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r27, 0xc0184900, &(0x7f0000000080)={0x10000, 0x20000000209, 0x0, 0xffffffffffffffff}) r29 = dup2(r27, r28) ioctl$ION_IOC_ALLOC(r29, 0xc0184900, &(0x7f0000000080)={0x20024e, 0x20000000209, 0x0, 0xffffffffffffffff}) r31 = dup2(r26, r30) ioctl$ION_IOC_ALLOC(r31, 0xc0184900, &(0x7f0000000000)={0x9cf0000008, 0x9, 0x0, 0xffffffffffffffff, 0x8}) sendmsg$NBD_CMD_CONNECT(r14, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x90, r19, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x10a}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xd83b}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}, @NBD_ATTR_SOCKETS={0x2c, 0x7, [{0x8, 0x1, r25}, {0x8, 0x1, r31}, {0x8, 0x1, r5}, {0x8}, {0x8, 0x1, r8}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x100}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x17a000000000}]}, 0x90}, 0x1, 0x0, 0x0, 0x20000000}, 0x80800) sendmsg$NBD_CMD_STATUS(r3, &(0x7f0000001200)={&(0x7f0000000000), 0xc, &(0x7f00000011c0)={&(0x7f0000001180)={0x38, r19, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xff}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xf}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x80000001}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000000}, 0x1e2fca3c767c0e67) r32 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r32, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) 16:07:20 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) 16:07:20 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000004f) 16:07:20 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_ex,ra_isize'}}]}) 16:07:20 executing program 1: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) 16:07:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\xff', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:20 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_i0ize', 0x3d, 0x7ff}}]}) 16:07:20 executing program 1: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) 16:07:20 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8240eb, 0x0, 0x0) r4 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r4, 0xc0205647, &(0x7f00000011c0)={0xa00000, 0x9, 0x3b6, 0xffffffffffffffff, 0x0, &(0x7f0000001180)={0x9909c9, 0xfffffffb, [], @p_u16=&(0x7f0000000000)=0x3}}) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000001200)='/dev/zero\x00', 0x40000, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x400448c8, &(0x7f0000001340)={r6, r2, 0x8, 0xe5, &(0x7f0000001240)="82a7cbc9d0b90836393b4696927cad2804944f5af29fed7a7113bbf656808ce635338bde518a893ad9832ed30f618320ad0eebbbad786531e07c3064b93a8d30290dfbb4a1daf51e04fd38182ef240ed5f44d2bcea754a35fed23bbbbc2a7c41af7f524425d289e3cfa0d35a67bdd0ac7ce89af5a25e3c0adf164c20183f3c1b938b15c506343ffb4e259b259355a5e908893c45664521de88d92552a8717d537702060d22309be110dc7626dfeb2b01ee3b18c78cf768787ab3ac052f48f88a1973aabd4d21fe6a815956af9fef9a422b3646269c4a5b4461c90633fbc603d6c39bec5501", 0x9, 0x3, 0x7, 0x7, 0x5, 0x3, 0xffff, 'syz1\x00'}) 16:07:20 executing program 1: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) 16:07:20 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000050) 16:07:21 executing program 1: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) 16:07:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\xff', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:21 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) socketpair(0x1, 0x80000, 0x8, &(0x7f0000002280)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$netrom_NETROM_T1(r4, 0x103, 0x1, &(0x7f00000022c0)=0xcf, 0x4) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r5, &(0x7f0000000000), 0x0, 0x10000, 0x0) 16:07:21 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_ext\na_isize'}}]}) 16:07:21 executing program 1: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) 16:07:21 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_iXize', 0x3d, 0x7ff}}]}) 16:07:21 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r4 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r4, r3) setsockopt$inet6_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f0000000000)=@ccm_128={{0x304}, "18478b97ab76eec5", "3feaad0c0a6a8674cddf84a9b834efed", "97a49a8a", "c4b32a32f6a5defb"}, 0x28) r5 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000011c0)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f00000012c0)={&(0x7f0000001180)={0x10, 0x0, 0x0, 0xd58056a235df1e7f}, 0xc, &(0x7f0000001280)={&(0x7f0000001200)={0x80, r6, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_LINK={0x2c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x14cb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xa068}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) ioctl$FBIOGETCMAP(r5, 0x4604, &(0x7f0000001400)={0xfd, 0x4, &(0x7f0000001300)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001340)=[0x0, 0x0], &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 16:07:21 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000051) 16:07:21 executing program 1: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) 16:07:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\xff', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:21 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) 16:07:21 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000000)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xaf) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) 16:07:21 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_ext\"a_isize'}}]}) 16:07:21 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000052) 16:07:21 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) 16:07:21 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_icize', 0x3d, 0x7ff}}]}) 16:07:21 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) 16:07:21 executing program 0: r0 = socket(0x10, 0x803, 0x0) socket(0x1, 0x4, 0x42) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0xe) r4 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000001240)='/dev/ocfs2_control\x00', 0x40000, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r4, 0x4008ae93, &(0x7f0000001280)=0xc002) ioctl$VIDIOC_PREPARE_BUF(r3, 0xc058565d, &(0x7f0000001180)={0x4, 0xa478314334b285ac, 0x4, 0x20000000, 0x830, {0x77359400}, {0x2, 0x0, 0x0, 0x6, 0x81, 0x3, "af8313f4"}, 0x2, 0x1, @planes=&(0x7f0000000000)={0x8, 0xfffffffd, @mem_offset=0x6}, 0x2, 0x0, r0}) ioctl$BLKIOOPT(r5, 0x1279, &(0x7f0000001200)) sendto(r0, &(0x7f0000000080)="1200feee0a7c", 0x12, 0x0, 0x0, 0x5) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) 16:07:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\xff', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 566.328384] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31754 sclass=netlink_route_socket pig=22171 comm=syz-executor.0 16:07:21 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0x2, 0x0) [ 566.392899] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31754 sclass=netlink_route_socket pig=22177 comm=syz-executor.0 16:07:21 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001480)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000001580)=0xe8) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r4 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r4, r3) bind$xdp(r1, &(0x7f00000015c0)={0x2c, 0x4, r2, 0x1f, r3}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) 16:07:22 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0x2, 0x0) 16:07:22 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000053) 16:07:22 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_idize', 0x3d, 0x7ff}}]}) 16:07:22 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_ext%a_isize'}}]}) 16:07:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:22 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0x2, 0x0) 16:07:22 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) r4 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) ioctl$sock_SIOCBRADDBR(r4, 0x89a0, &(0x7f0000000000)='eql\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$KDGKBMETA(r7, 0x4b62, &(0x7f0000001180)) 16:07:22 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_,ant_extra_isize'}}]}) 16:07:22 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_iiize', 0x3d, 0x7ff}}]}) 16:07:22 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000054) 16:07:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:22 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_PAUSE(r6, 0x40044145, &(0x7f0000000000)=0x7f) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 16:07:22 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_ext,a_isize'}}]}) 16:07:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:22 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40), 0x0, 0x0, 0x0) 16:07:22 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000055) 16:07:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\xfc', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:22 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_ilize', 0x3d, 0x7ff}}]}) 16:07:22 executing program 0: r0 = semget$private(0x0, 0x7, 0x0) semop(r0, &(0x7f0000000240)=[{0x0, 0xfffffffffffffff8}], 0x2) semop(r0, &(0x7f0000000000)=[{0x0, 0xffff, 0x1800}], 0x1) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f00000011c0)={0x400000, 0x2, 0x4, 0x20000000, 0x2, {0x0, 0x7530}, {0x1, 0x2, 0x5, 0xcc, 0x66, 0x1f, "e6b8e549"}, 0x1ff, 0x3, @planes=&(0x7f0000001180)={0x7ff, 0x9, @mem_offset=0x5, 0xfffffffc}, 0x7fff, 0x0, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001400)={r1, &(0x7f0000001240)="06d46c48c8bf317da080702b778e0599f4dbafdd93f3e4de2b47a07eef4a7cc0eccdb0f38280b610630327e3eb6c64191db4f9d53b8d5740971eca95d2a09c7a73ce5b767b33c19060a98a3fc05d611028dc67f3c35db5dc7e54cc2eba6080c05c145f8b136938be06aaac272b464d33200ab1fb5fe7c42e9fb8472ab4066b9efe237503e9ec15ca90e2165f24bd57c7b67a1662531249549fa4dc8c5f9546cf0dac00bd6cdd28818e95", &(0x7f0000001300)="34abc4d5a139cd99daaf1aa01458ea60a49afb0d7160c1bd1f70010199510092f14f37cbbcc358f0d561b4580c485de80b71e18e4f77f631b1d85cc13416a0c8fed22d6a49ea4c88a945b2def1393c060a3a01d2f53c79d8d5079f1661d43672b4affb5320eecce25b74badedaa4155cbd5465ab31cced3ab33330e78d6a03114dd65e0f50764af42ecf7dd1b55ef77c27912d71265fc2476418f5e4f47bbb170e584ee838ffba26f45dcf1a8cad43a23a0e60a91e12ee011b71c1517ad9733179308edb91c56173d2576c230159f344e91da4ed87d3546ada9e8f0a6c76d04937cee156bc69b7ff78906152ea6c4e", 0x7}, 0x20) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)=[0x9]) r2 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendto(r2, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r2, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) 16:07:22 executing program 1 (fault-call:2 fault-nth:0): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) 16:07:23 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000056) [ 567.498979] FAULT_INJECTION: forcing a failure. [ 567.498979] name failslab, interval 1, probability 0, space 0, times 0 [ 567.527474] CPU: 0 PID: 22259 Comm: syz-executor.1 Not tainted 4.19.91-syzkaller #0 [ 567.535325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 567.544702] Call Trace: [ 567.547311] dump_stack+0x197/0x210 [ 567.550965] should_fail.cold+0xa/0x1b [ 567.554896] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 567.560032] ? lock_downgrade+0x880/0x880 [ 567.564210] __should_failslab+0x121/0x190 [ 567.568468] should_failslab+0x9/0x14 [ 567.572285] kmem_cache_alloc+0x2ae/0x700 [ 567.576459] ? __might_sleep+0x95/0x190 [ 567.580450] __anon_vma_prepare+0x62/0x3c0 [ 567.584709] ? mark_held_locks+0x100/0x100 [ 567.588960] do_huge_pmd_anonymous_page+0xeff/0x14e0 [ 567.594088] ? thp_get_unmapped_area+0x1f0/0x1f0 [ 567.598859] ? __pmd+0x60/0x60 [ 567.602105] __handle_mm_fault+0x2c80/0x3f80 [ 567.606537] ? copy_page_range+0x2030/0x2030 [ 567.610977] ? count_memcg_event_mm+0x2b1/0x4d0 [ 567.615678] handle_mm_fault+0x1b5/0x690 [ 567.619763] __do_page_fault+0x62a/0xe90 [ 567.623850] ? vmalloc_fault+0x740/0x740 [ 567.627928] ? trace_hardirqs_off_caller+0x65/0x220 [ 567.632959] ? __might_fault+0x12b/0x1e0 [ 567.637041] do_page_fault+0x71/0x57d [ 567.640859] page_fault+0x1e/0x30 [ 567.644344] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 567.650243] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 567.669151] RSP: 0018:ffff88805354fcc8 EFLAGS: 00010206 [ 567.674530] RAX: ffffed100a6a9fd0 RBX: 0000000000000070 RCX: 0000000000000070 [ 567.681812] RDX: 0000000000000070 RSI: ffff88805354fe10 RDI: 0000000020000000 [ 567.689104] RBP: ffff88805354fd00 R08: 1ffff1100a6a9fc2 R09: ffffed100a6a9fd0 [ 567.696398] R10: ffffed100a6a9fcf R11: ffff88805354fe7f R12: 0000000020000000 [ 567.703682] R13: ffff88805354fe10 R14: 0000000020000070 R15: 00007ffffffff000 [ 567.711022] ? _copy_to_user+0xf7/0x120 [ 567.715019] ksys_shmctl+0x1df/0x3a0 [ 567.718780] ? __ia32_sys_shmget+0x1d0/0x1d0 [ 567.723230] ? kasan_check_write+0x14/0x20 [ 567.727489] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 567.732362] ? check_preemption_disabled+0x48/0x290 [ 567.737397] ? wait_for_completion+0x440/0x440 [ 567.742003] ? __sb_end_write+0xd9/0x110 [ 567.746114] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 567.751678] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 567.756451] ? do_syscall_64+0x26/0x620 [ 567.760443] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 567.765821] ? do_syscall_64+0x26/0x620 [ 567.769815] __x64_sys_shmctl+0x73/0xb0 [ 567.773808] do_syscall_64+0xfd/0x620 [ 567.777629] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 567.782829] RIP: 0033:0x45a919 [ 567.786035] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 567.804947] RSP: 002b:00007f6f0c65cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000001f [ 567.812675] RAX: ffffffffffffffda RBX: 00007f6f0c65cc90 RCX: 000000000045a919 [ 567.819963] RDX: 0000000020000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 567.827259] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 567.834544] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6f0c65d6d4 [ 567.841825] R13: 00000000004ca6f9 R14: 00000000004e38e0 R15: 0000000000000004 16:07:23 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extr\n_isize'}}]}) 16:07:23 executing program 1 (fault-call:2 fault-nth:1): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) [ 568.041697] FAULT_INJECTION: forcing a failure. [ 568.041697] name failslab, interval 1, probability 0, space 0, times 0 [ 568.058559] EXT4-fs: 32 callbacks suppressed [ 568.058571] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ilize=0x00000000000007ff" or missing value [ 568.061224] CPU: 0 PID: 22270 Comm: syz-executor.1 Not tainted 4.19.91-syzkaller #0 [ 568.081328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 568.090708] Call Trace: [ 568.090738] dump_stack+0x197/0x210 [ 568.090758] should_fail.cold+0xa/0x1b [ 568.090776] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 568.090794] ? lock_downgrade+0x880/0x880 [ 568.090815] __should_failslab+0x121/0x190 [ 568.090833] should_failslab+0x9/0x14 [ 568.118268] kmem_cache_alloc+0x2ae/0x700 [ 568.122571] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 568.127631] ? anon_vma_compatible+0x70/0x2d0 [ 568.132173] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 568.137734] __anon_vma_prepare+0x1b1/0x3c0 [ 568.142859] ? mark_held_locks+0x100/0x100 [ 568.147132] do_huge_pmd_anonymous_page+0xeff/0x14e0 [ 568.152263] ? thp_get_unmapped_area+0x1f0/0x1f0 [ 568.157027] ? __pmd+0x60/0x60 [ 568.160248] __handle_mm_fault+0x2c80/0x3f80 [ 568.164683] ? copy_page_range+0x2030/0x2030 [ 568.169143] ? count_memcg_event_mm+0x2b1/0x4d0 [ 568.173843] handle_mm_fault+0x1b5/0x690 [ 568.177937] __do_page_fault+0x62a/0xe90 [ 568.182051] ? vmalloc_fault+0x740/0x740 [ 568.186132] ? trace_hardirqs_off_caller+0x65/0x220 [ 568.191165] ? __might_fault+0x12b/0x1e0 [ 568.195264] do_page_fault+0x71/0x57d [ 568.199087] page_fault+0x1e/0x30 [ 568.202558] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 568.208437] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 568.227332] RSP: 0018:ffff8880480b7cc8 EFLAGS: 00010206 [ 568.232692] RAX: ffffed1009016fd0 RBX: 0000000000000070 RCX: 0000000000000070 [ 568.240040] RDX: 0000000000000070 RSI: ffff8880480b7e10 RDI: 0000000020000000 [ 568.247314] RBP: ffff8880480b7d00 R08: 1ffff11009016fc2 R09: ffffed1009016fd0 [ 568.254576] R10: ffffed1009016fcf R11: ffff8880480b7e7f R12: 0000000020000000 [ 568.261841] R13: ffff8880480b7e10 R14: 0000000020000070 R15: 00007ffffffff000 [ 568.269134] ? _copy_to_user+0xf7/0x120 [ 568.273284] ksys_shmctl+0x1df/0x3a0 [ 568.277008] ? __ia32_sys_shmget+0x1d0/0x1d0 [ 568.281425] ? kasan_check_write+0x14/0x20 [ 568.285662] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 568.290499] ? check_preemption_disabled+0x48/0x290 [ 568.295509] ? wait_for_completion+0x440/0x440 [ 568.300087] ? __sb_end_write+0xd9/0x110 [ 568.304147] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 568.309684] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 568.314434] ? do_syscall_64+0x26/0x620 [ 568.318404] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 568.323763] ? do_syscall_64+0x26/0x620 [ 568.327743] __x64_sys_shmctl+0x73/0xb0 [ 568.331754] do_syscall_64+0xfd/0x620 [ 568.335557] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 568.340758] RIP: 0033:0x45a919 [ 568.343945] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 568.362839] RSP: 002b:00007f6f0c65cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000001f [ 568.370543] RAX: ffffffffffffffda RBX: 00007f6f0c65cc90 RCX: 000000000045a919 [ 568.377806] RDX: 0000000020000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 568.385083] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 16:07:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\xfd', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 568.392361] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6f0c65d6d4 [ 568.399630] R13: 00000000004ca6f9 R14: 00000000004e38e0 R15: 0000000000000004 [ 568.431567] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr [ 568.431567] _isize=0x0000000000000000" or missing value 16:07:23 executing program 0: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000001180), &(0x7f00000011c0)=0x4) r2 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendto(r2, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r2, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(r5, 0xc004562f, &(0x7f0000000000)=0x5) 16:07:23 executing program 1 (fault-call:2 fault-nth:2): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) 16:07:23 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_ioize', 0x3d, 0x7ff}}]}) 16:07:24 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000057) [ 568.582436] FAULT_INJECTION: forcing a failure. [ 568.582436] name failslab, interval 1, probability 0, space 0, times 0 [ 568.608323] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr [ 568.608323] _isize=0x0000000000000000" or missing value [ 568.624213] CPU: 1 PID: 22289 Comm: syz-executor.1 Not tainted 4.19.91-syzkaller #0 [ 568.632063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 568.641434] Call Trace: [ 568.644049] dump_stack+0x197/0x210 [ 568.647695] should_fail.cold+0xa/0x1b [ 568.651602] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 568.656724] ? lock_downgrade+0x880/0x880 [ 568.660903] __should_failslab+0x121/0x190 [ 568.665159] should_failslab+0x9/0x14 [ 568.668976] kmem_cache_alloc+0x2ae/0x700 [ 568.673153] __khugepaged_enter+0x3b/0x390 [ 568.677409] do_huge_pmd_anonymous_page+0x1026/0x14e0 [ 568.682623] ? thp_get_unmapped_area+0x1f0/0x1f0 [ 568.687392] ? __pmd+0x60/0x60 [ 568.690605] __handle_mm_fault+0x2c80/0x3f80 [ 568.695055] ? copy_page_range+0x2030/0x2030 [ 568.699502] ? count_memcg_event_mm+0x2b1/0x4d0 [ 568.704192] handle_mm_fault+0x1b5/0x690 [ 568.708297] __do_page_fault+0x62a/0xe90 [ 568.712402] ? vmalloc_fault+0x740/0x740 [ 568.716481] ? trace_hardirqs_off_caller+0x65/0x220 [ 568.721523] ? __might_fault+0x12b/0x1e0 [ 568.725756] do_page_fault+0x71/0x57d [ 568.729681] page_fault+0x1e/0x30 [ 568.733157] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 568.739056] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 568.757970] RSP: 0018:ffff88807f037cc8 EFLAGS: 00010206 [ 568.763347] RAX: ffffed100fe06fd0 RBX: 0000000000000070 RCX: 0000000000000070 [ 568.770630] RDX: 0000000000000070 RSI: ffff88807f037e10 RDI: 0000000020000000 [ 568.777913] RBP: ffff88807f037d00 R08: 1ffff1100fe06fc2 R09: ffffed100fe06fd0 [ 568.785192] R10: ffffed100fe06fcf R11: ffff88807f037e7f R12: 0000000020000000 [ 568.792473] R13: ffff88807f037e10 R14: 0000000020000070 R15: 00007ffffffff000 [ 568.799801] ? _copy_to_user+0xf7/0x120 [ 568.803798] ksys_shmctl+0x1df/0x3a0 [ 568.807529] ? __ia32_sys_shmget+0x1d0/0x1d0 [ 568.811954] ? kasan_check_write+0x14/0x20 [ 568.816206] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 568.821071] ? check_preemption_disabled+0x48/0x290 [ 568.826105] ? wait_for_completion+0x440/0x440 [ 568.830714] ? __sb_end_write+0xd9/0x110 [ 568.834800] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 568.840366] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 568.845135] ? do_syscall_64+0x26/0x620 [ 568.849118] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 568.854518] ? do_syscall_64+0x26/0x620 [ 568.858534] __x64_sys_shmctl+0x73/0xb0 [ 568.862533] do_syscall_64+0xfd/0x620 [ 568.866358] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 568.871558] RIP: 0033:0x45a919 [ 568.874759] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 568.893682] RSP: 002b:00007f6f0c63bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000001f [ 568.901424] RAX: ffffffffffffffda RBX: 00007f6f0c63bc90 RCX: 000000000045a919 [ 568.908711] RDX: 0000000020000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 568.915989] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 568.923288] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6f0c63c6d4 [ 568.930575] R13: 00000000004ca6f9 R14: 00000000004e38e0 R15: 0000000000000003 16:07:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x8c', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:24 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000058) 16:07:24 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000000)=0x3, 0x8) recvmmsg(r0, &(0x7f00000049c0)=[{{&(0x7f0000001180)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x0, &(0x7f0000001540)=[{&(0x7f0000001200)=""/76}, {&(0x7f0000006b80)=""/102400}, {&(0x7f00000012c0)=""/131}, {&(0x7f0000001380)=""/16}, {&(0x7f00000013c0)=""/243, 0x2f3}, {&(0x7f00000014c0)=""/96}], 0x0, &(0x7f00000015c0)=""/213}, 0x4}, {{&(0x7f00000016c0)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x0, &(0x7f0000001900)=[{&(0x7f0000001740)=""/232}, {&(0x7f0000004bc0)=""/173}], 0x0, &(0x7f0000001940)=""/4096}, 0x5}, {{&(0x7f0000002940)=@ax25={{0x3, @netrom}, [@default, @null, @null, @rose, @bcast, @bcast, @netrom, @default]}, 0x0, &(0x7f0000003b80)}, 0x5}, {{0x0, 0x1b0, &(0x7f0000004000)=[{&(0x7f0000003bc0)=""/201}, {&(0x7f0000003cc0)=""/200}, {&(0x7f0000003dc0)=""/65}, {&(0x7f0000003e40)=""/47}, {&(0x7f0000003e80)=""/171}, {&(0x7f0000003f40)=""/141}]}, 0x6}, {{&(0x7f0000004080)=@ethernet={0x0, @broadcast}, 0x0, &(0x7f00000041c0)=[{&(0x7f0000004100)=""/155}], 0x0, &(0x7f0000004200)=""/85, 0xffffff60}, 0x9}, {{&(0x7f0000004280)=@can, 0x0, &(0x7f0000004380)=[{&(0x7f0000004300)=""/85}], 0x0, &(0x7f00000043c0)=""/81, 0x130}, 0x80000000}, {{&(0x7f0000004440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0, &(0x7f0000004640)=[{&(0x7f00000044c0)=""/134}, {&(0x7f0000004580)=""/73}, {&(0x7f0000004600)=""/4}], 0x0, &(0x7f0000004680)=""/219}, 0x5}, {{&(0x7f0000004780)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x0, &(0x7f0000004900)=[{&(0x7f0000004800)=""/235}], 0x0, &(0x7f0000004940)=""/78}, 0x4}], 0x1, 0x0, 0x0) 16:07:24 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extr\"_isize'}}]}) 16:07:24 executing program 1 (fault-call:2 fault-nth:3): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) [ 569.057186] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ioize=0x00000000000007ff" or missing value 16:07:24 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001180)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000001240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000001}, 0xc, &(0x7f0000001200)={&(0x7f00000011c0)={0x24, r1, 0x20, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffffffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000821}, 0x2802c0c1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendto(r3, &(0x7f0000000000)="1200003a1200e7ef007b0a00f4afd7030a97b79b5472e68f", 0xd, 0x0, 0x0, 0xc4d8c0facea0c0c3) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) [ 569.251862] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ioize=0x00000000000007ff" or missing value 16:07:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\xf5', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 569.295530] FAULT_INJECTION: forcing a failure. [ 569.295530] name failslab, interval 1, probability 0, space 0, times 0 16:07:24 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x8}, 0x3c) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r1, &(0x7f0000000180), &(0x7f0000000300)}, 0x20) perf_event_open$cgroup(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x4, &(0x7f00000002c0)={r1, &(0x7f00000000c0), 0x713000}, 0x20) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000011c0), &(0x7f0000001200)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r9, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r9}, [@IFA_LOCAL={0x8, 0x2, @multicast1}, @IFA_FLAGS={0x8, 0x3}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup3(r11, r10, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000001240)={0x1, 0x401, 0xc8, 0x3e0b, 0x646, r1, 0xffff, [], r9, r12, 0x0, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='eql\x00', 0x10) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r5, &(0x7f0000001180)={0x1, 0xe2}, 0x2) [ 569.337470] CPU: 1 PID: 22315 Comm: syz-executor.1 Not tainted 4.19.91-syzkaller #0 [ 569.345337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 569.354709] Call Trace: [ 569.357324] dump_stack+0x197/0x210 [ 569.360974] should_fail.cold+0xa/0x1b [ 569.364885] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 569.370012] ? lock_downgrade+0x880/0x880 [ 569.374215] __should_failslab+0x121/0x190 [ 569.378486] should_failslab+0x9/0x14 [ 569.382321] kmem_cache_alloc+0x2ae/0x700 [ 569.386509] __khugepaged_enter+0x3b/0x390 [ 569.390793] do_huge_pmd_anonymous_page+0x1026/0x14e0 [ 569.396036] ? thp_get_unmapped_area+0x1f0/0x1f0 [ 569.400813] ? __pmd+0x60/0x60 [ 569.404045] __handle_mm_fault+0x2c80/0x3f80 [ 569.408478] ? copy_page_range+0x2030/0x2030 [ 569.412926] ? count_memcg_event_mm+0x2b1/0x4d0 [ 569.417619] handle_mm_fault+0x1b5/0x690 [ 569.421712] __do_page_fault+0x62a/0xe90 [ 569.425795] ? vmalloc_fault+0x740/0x740 [ 569.429871] ? trace_hardirqs_off_caller+0x65/0x220 [ 569.434899] ? __might_fault+0x12b/0x1e0 [ 569.438993] do_page_fault+0x71/0x57d [ 569.442837] page_fault+0x1e/0x30 [ 569.446332] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 569.452234] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 569.471168] RSP: 0018:ffff88807f037cc8 EFLAGS: 00010206 [ 569.476584] RAX: ffffed100fe06fd0 RBX: 0000000000000070 RCX: 0000000000000070 [ 569.486276] RDX: 0000000000000070 RSI: ffff88807f037e10 RDI: 0000000020000000 [ 569.493573] RBP: ffff88807f037d00 R08: 1ffff1100fe06fc2 R09: ffffed100fe06fd0 [ 569.500958] R10: ffffed100fe06fcf R11: ffff88807f037e7f R12: 0000000020000000 [ 569.508240] R13: ffff88807f037e10 R14: 0000000020000070 R15: 00007ffffffff000 [ 569.515556] ? _copy_to_user+0xf7/0x120 [ 569.519557] ksys_shmctl+0x1df/0x3a0 [ 569.523302] ? __ia32_sys_shmget+0x1d0/0x1d0 [ 569.527726] ? kasan_check_write+0x14/0x20 [ 569.532068] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 569.536927] ? check_preemption_disabled+0x48/0x290 [ 569.541964] ? wait_for_completion+0x440/0x440 [ 569.546568] ? __sb_end_write+0xd9/0x110 [ 569.550657] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 569.556223] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 569.561079] ? do_syscall_64+0x26/0x620 [ 569.565065] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 569.570441] ? do_syscall_64+0x26/0x620 [ 569.574439] __x64_sys_shmctl+0x73/0xb0 [ 569.579039] do_syscall_64+0xfd/0x620 [ 569.582875] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 569.588168] RIP: 0033:0x45a919 [ 569.591405] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 569.610418] RSP: 002b:00007f6f0c65cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000001f [ 569.618237] RAX: ffffffffffffffda RBX: 00007f6f0c65cc90 RCX: 000000000045a919 [ 569.626128] RDX: 0000000020000000 RSI: 0000000000000002 RDI: 0000000000000000 16:07:25 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000059) [ 569.633409] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 569.640700] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6f0c65d6d4 [ 569.648022] R13: 00000000004ca6f9 R14: 00000000004e38e0 R15: 0000000000000004 [ 569.663406] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr"_isize=0x0000000000000000" or missing value 16:07:25 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_ipize', 0x3d, 0x7ff}}]}) 16:07:25 executing program 1 (fault-call:2 fault-nth:4): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) [ 569.753800] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 569.819401] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr"_isize=0x0000000000000000" or missing value [ 569.838614] FAULT_INJECTION: forcing a failure. [ 569.838614] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 569.886668] CPU: 0 PID: 22334 Comm: syz-executor.1 Not tainted 4.19.91-syzkaller #0 [ 569.894524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 569.894530] Call Trace: [ 569.894553] dump_stack+0x197/0x210 [ 569.894576] should_fail.cold+0xa/0x1b [ 569.906545] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 569.906569] ? __might_sleep+0x95/0x190 [ 569.906594] __alloc_pages_nodemask+0x1ee/0x750 [ 569.914094] ? mem_cgroup_throttle_swaprate+0x196/0x66e [ 569.914119] ? __alloc_pages_slowpath+0x2870/0x2870 [ 569.914141] ? kasan_check_read+0x11/0x20 [ 569.923742] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 569.923766] alloc_pages_current+0x107/0x210 [ 569.923786] pte_alloc_one+0x1b/0x1a0 [ 569.923806] do_huge_pmd_anonymous_page+0x712/0x14e0 [ 569.961870] ? thp_get_unmapped_area+0x1f0/0x1f0 [ 569.966652] __handle_mm_fault+0x2c80/0x3f80 [ 569.971092] ? copy_page_range+0x2030/0x2030 [ 569.975539] ? count_memcg_event_mm+0x2b1/0x4d0 [ 569.980285] handle_mm_fault+0x1b5/0x690 [ 569.984380] __do_page_fault+0x62a/0xe90 [ 569.988901] ? vmalloc_fault+0x740/0x740 [ 569.992981] ? trace_hardirqs_off_caller+0x65/0x220 [ 569.998010] ? __might_fault+0x12b/0x1e0 [ 570.002090] do_page_fault+0x71/0x57d [ 570.005910] page_fault+0x1e/0x30 [ 570.009384] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 570.015309] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 570.034584] RSP: 0018:ffff88809ea47cc8 EFLAGS: 00010206 [ 570.040045] RAX: ffffed1013d48fd0 RBX: 0000000000000070 RCX: 0000000000000070 [ 570.047324] RDX: 0000000000000070 RSI: ffff88809ea47e10 RDI: 0000000020000000 [ 570.054602] RBP: ffff88809ea47d00 R08: 1ffff11013d48fc2 R09: ffffed1013d48fd0 [ 570.061865] R10: ffffed1013d48fcf R11: ffff88809ea47e7f R12: 0000000020000000 [ 570.069142] R13: ffff88809ea47e10 R14: 0000000020000070 R15: 00007ffffffff000 [ 570.076444] ? _copy_to_user+0xf7/0x120 [ 570.080428] ksys_shmctl+0x1df/0x3a0 [ 570.084139] ? __ia32_sys_shmget+0x1d0/0x1d0 [ 570.088538] ? kasan_check_write+0x14/0x20 [ 570.093176] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 570.098011] ? check_preemption_disabled+0x48/0x290 [ 570.103021] ? wait_for_completion+0x440/0x440 [ 570.107607] ? __sb_end_write+0xd9/0x110 [ 570.111768] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 570.117308] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 570.122064] ? do_syscall_64+0x26/0x620 [ 570.126470] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 570.131838] ? do_syscall_64+0x26/0x620 [ 570.135809] __x64_sys_shmctl+0x73/0xb0 [ 570.139797] do_syscall_64+0xfd/0x620 [ 570.143601] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 570.148855] RIP: 0033:0x45a919 [ 570.152056] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 570.171047] RSP: 002b:00007f6f0c65cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000001f [ 570.178772] RAX: ffffffffffffffda RBX: 00007f6f0c65cc90 RCX: 000000000045a919 16:07:25 executing program 0: r0 = socket(0x10, 0x0, 0xa0) r1 = socket(0x1e, 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r2) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000080)=@req={0x1, 0x5}, 0x2) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@loopback, 0x1, 0x2, 0x0, 0x2, 0x5, 0x3}, &(0x7f0000001180)=0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) [ 570.186031] RDX: 0000000020000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 570.193292] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 570.200556] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6f0c65d6d4 [ 570.207812] R13: 00000000004ca6f9 R14: 00000000004e38e0 R15: 0000000000000004 16:07:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\xf6', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:25 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000005a) 16:07:25 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extr%_isize'}}]}) [ 570.290440] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ipize=0x00000000000007ff" or missing value 16:07:25 executing program 1 (fault-call:2 fault-nth:5): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) 16:07:25 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0xfffff878, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) 16:07:26 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000005b) [ 570.498414] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ipize=0x00000000000007ff" or missing value 16:07:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\xfb', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 570.586052] FAULT_INJECTION: forcing a failure. [ 570.586052] name failslab, interval 1, probability 0, space 0, times 0 16:07:26 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_iuize', 0x3d, 0x7ff}}]}) [ 570.633213] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr%_isize=0x0000000000000000" or missing value [ 570.682309] CPU: 1 PID: 22362 Comm: syz-executor.1 Not tainted 4.19.91-syzkaller #0 [ 570.690170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 570.699540] Call Trace: [ 570.702151] dump_stack+0x197/0x210 [ 570.705829] should_fail.cold+0xa/0x1b [ 570.709754] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 570.714898] ? lock_downgrade+0x880/0x880 [ 570.719087] __should_failslab+0x121/0x190 [ 570.723366] should_failslab+0x9/0x14 [ 570.727455] kmem_cache_alloc+0x2ae/0x700 [ 570.731809] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 570.737457] ptlock_alloc+0x20/0x70 [ 570.741105] pte_alloc_one+0x6d/0x1a0 [ 570.744927] do_huge_pmd_anonymous_page+0x712/0x14e0 [ 570.750053] ? thp_get_unmapped_area+0x1f0/0x1f0 [ 570.754833] __handle_mm_fault+0x2c80/0x3f80 [ 570.759277] ? copy_page_range+0x2030/0x2030 [ 570.763720] ? count_memcg_event_mm+0x2b1/0x4d0 [ 570.768408] handle_mm_fault+0x1b5/0x690 [ 570.772490] __do_page_fault+0x62a/0xe90 [ 570.776575] ? vmalloc_fault+0x740/0x740 [ 570.780674] ? trace_hardirqs_off_caller+0x65/0x220 [ 570.785796] ? __might_fault+0x12b/0x1e0 [ 570.789878] do_page_fault+0x71/0x57d [ 570.793698] page_fault+0x1e/0x30 [ 570.797189] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 570.803089] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 570.822173] RSP: 0018:ffff888058177cc8 EFLAGS: 00010206 [ 570.827548] RAX: ffffed100b02efd0 RBX: 0000000000000070 RCX: 0000000000000070 [ 570.835144] RDX: 0000000000000070 RSI: ffff888058177e10 RDI: 0000000020000000 [ 570.842432] RBP: ffff888058177d00 R08: 1ffff1100b02efc2 R09: ffffed100b02efd0 [ 570.849730] R10: ffffed100b02efcf R11: ffff888058177e7f R12: 0000000020000000 [ 570.857010] R13: ffff888058177e10 R14: 0000000020000070 R15: 00007ffffffff000 [ 570.864506] ? _copy_to_user+0xf7/0x120 [ 570.868510] ksys_shmctl+0x1df/0x3a0 [ 570.872251] ? __ia32_sys_shmget+0x1d0/0x1d0 [ 570.876685] ? kasan_check_write+0x14/0x20 [ 570.880939] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 570.885803] ? check_preemption_disabled+0x48/0x290 [ 570.890853] ? wait_for_completion+0x440/0x440 [ 570.895656] ? __sb_end_write+0xd9/0x110 [ 570.899742] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 570.905327] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 570.910112] ? do_syscall_64+0x26/0x620 [ 570.914109] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 570.919482] ? do_syscall_64+0x26/0x620 [ 570.923476] __x64_sys_shmctl+0x73/0xb0 [ 570.927467] do_syscall_64+0xfd/0x620 [ 570.931286] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 570.936488] RIP: 0033:0x45a919 [ 570.939709] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 570.959909] RSP: 002b:00007f6f0c65cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000001f [ 570.968160] RAX: ffffffffffffffda RBX: 00007f6f0c65cc90 RCX: 000000000045a919 [ 570.975443] RDX: 0000000020000000 RSI: 0000000000000002 RDI: 0000000000000000 16:07:26 executing program 0: r0 = socket(0x10, 0x803, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000000)={'caif0\x00', {0x2, 0x4e23, @multicast2}}) ioctl$int_in(r0, 0x0, &(0x7f0000000040)=0xe0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) r5 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f000000d379)={&(0x7f0000000480)=ANY=[@ANYBLOB="180000001400010300000000000000001e000000c10000935ce39c124820ba00b81623949ee7ea2e7a618fa30e2c842a0fb33ad8388ada0debd04e0dd6567c4543d6cb126b0d735765af3a71b6daeee9ac62b9d64d27ce546e9deada0ccc7f9f0b91b7ac42a3c0ba10e3d9e2185b1a14573f32853b9f614a1ee4a9f88793c8d4ea18e815837c8a89e5c492f4f897fec9a940e9a5ee30f2ad1e178a06ad227acf19196364dcb49842febbe522dc42fbed2e91e5f5dadffed2df233bc572505b04828d09d965645101b10c6f317bc0a436a908a3fb9a3153a50d9519965968d4ff9dab9529dc62b8013e8becc9e5c323eb6d000028100948b505157f39994d945490031019cfeec0cd102aa3c05b2ab1cb76f00c96436387a9da20e706cb3a0295112afe0e36c1aade85191e78a65944df89a6e3eaa127a1931aeb5eca9817e2694d312e19b9e9ddc1ccfa972a8323657e1b705c0382f99a4d17d84890b08a664e55fccf14676f3609f15d745f931b7783b92d7d63001798424ffe04579e6590d69b3574b46287fcffffffff80000001f28d13a601b4343107ea8f53ae0122497b400c82764556fd104dc38a2a0d6e4e7a7b4d7b3b8a1fe90440e41e414561d79bd524d1098c6ddb40fae2f096cefb2eb7bd47bfec7930802b2889d6e5a340e843bddbe533d96dada31babe25bcb5b383df5de01b4e9679b7d6d670e3d2ee28a4e1c5d1780c097984d3142f64fd9"], 0x18}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) r6 = accept$netrom(0xffffffffffffffff, &(0x7f0000001180)={{0x3, @bcast}, [@null, @netrom, @null, @netrom, @null, @netrom, @bcast, @bcast]}, &(0x7f0000001200)=0x48) recvmmsg(r6, &(0x7f0000006b40)=[{{0x0, 0x9, &(0x7f0000000040), 0x2}, 0x2}], 0x8000238, 0x0, 0x0) r7 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r7, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r8 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r8, r7) fcntl$getownex(r7, 0x10, &(0x7f00000000c0)) [ 570.982723] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 570.990006] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6f0c65d6d4 [ 570.997941] R13: 00000000004ca6f9 R14: 00000000004e38e0 R15: 0000000000000004 16:07:26 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000005c) 16:07:26 executing program 1 (fault-call:2 fault-nth:6): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) 16:07:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:26 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extr,_isize'}}]}) 16:07:26 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = socket(0x1e, 0x0, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x43, &(0x7f0000001180)={0x77359400}, 0x10) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) r3 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) socket$bt_cmtp(0x1f, 0x3, 0x5) signalfd(r0, &(0x7f0000000000)={0x2}, 0x8) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r5 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r5, r4) r6 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) 16:07:26 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) 16:07:26 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000005d) 16:07:26 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_ixize', 0x3d, 0x7ff}}]}) 16:07:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:26 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40), 0x0, 0x0, 0x0) 16:07:26 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0x3, &(0x7f0000000000)=""/106) 16:07:27 executing program 0: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) r1 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendto(r1, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r1, &(0x7f0000001200), 0x4000000000001a3, 0x20, 0x0) 16:07:27 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra\nisize'}}]}) 16:07:27 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0x4, &(0x7f0000000000)=""/106) 16:07:27 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000005e) 16:07:27 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r1) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) 16:07:27 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0x5, &(0x7f0000000000)=""/106) 16:07:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:27 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_is\"ze', 0x3d, 0x7ff}}]}) 16:07:27 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0x9, &(0x7f0000000000)=""/106) 16:07:27 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000005f) 16:07:27 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra\"isize'}}]}) 16:07:27 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0xb, &(0x7f0000000000)=""/106) 16:07:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:27 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000060) 16:07:27 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0xc, &(0x7f0000000000)=""/106) 16:07:27 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_is,ze', 0x3d, 0x7ff}}]}) 16:07:27 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) r4 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) r5 = getgid() r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) r8 = syz_open_dev$swradio(0x0, 0x0, 0x2) r9 = gettid() r10 = socket$inet6(0xa, 0x5, 0x0) r11 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r11, 0x200004) sendfile(r10, r11, 0x0, 0x80001d00c0d0) fcntl$getownex(r10, 0x10, &(0x7f0000000540)={0x0, 0x0}) getresgid(&(0x7f0000000580)=0x0, &(0x7f00000005c0), &(0x7f0000000600)) r14 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r7, r15, 0x0) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r8, &(0x7f0000000e80)=[{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000200)=[{0x0}, {&(0x7f00000001c0)="25fe777ccac8f16f94d57b81fce50216a47a399fb495eb", 0x17}], 0x2, &(0x7f0000000780)=[@cred={{0x1c, 0x1, 0x2, {r9}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r12, 0x0, r13}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r15, r16}}}], 0x98, 0x4000000}, {&(0x7f0000000880)=@abs={0x0, 0x0, 0x4e23}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x20020041}], 0x2, 0x0) r17 = getegid() fchown(0xffffffffffffffff, 0x0, r17) newfstatat(0xffffffffffffff9c, &(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) r19 = getegid() fchown(0xffffffffffffffff, 0x0, r19) fsetxattr$system_posix_acl(r4, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000001240)={{}, {0x1, 0x7}, [{}], {}, [{0x8, 0x6, r5}, {0x8, 0x1, r13}, {0x8, 0x6, r17}, {0x8, 0xc222b72ae1187461, r18}, {0x8, 0x1, r19}], {0x10, 0x2}, {0x20, 0x3}}, 0x54, 0x2) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) 16:07:27 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0xd, &(0x7f0000000000)=""/106) 16:07:27 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e21, 0x8e, @loopback, 0x7fff}}, 0x24) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) 16:07:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\xff', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:27 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra,isize'}}]}) 16:07:27 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0xe, &(0x7f0000000000)=""/106) 16:07:28 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_QUERYCTRL(r2, 0xc0445624, &(0x7f0000001180)={0x6, 0x4, "98495de6e661e2146adab0b0e691dd522e354471a9dc0fd5b45af9638093f1d0", 0xfff, 0xcb57, 0x401, 0x0, 0x208}) syz_open_dev$tty1(0xc, 0x4, 0x3) r3 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup3(r8, r7, 0x0) r10 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r10, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r11 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r11, r10) ioctl$SIOCX25GCALLUSERDATA(r10, 0x89e4, &(0x7f0000001200)={0x16, "0c46fadf8693090911da75c4f76f88b95244baab6c48425328bfaac3104d286f779c33ee4d1931a547ca48f601d1afa33792ae89c9beeef75daa50196422cadd9c30b6766d142e78be4daa7f4374d8de67a04f2a0f2bc24866c424b925e93d70146596582e47bbe43df99fbe6f97ef66e50e2874575b830f30cef76fd11d4a07"}) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$USBDEVFS_GET_SPEED(r9, 0x551f) sendto(r3, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r3, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) r12 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r12, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r15, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) getsockopt$netrom_NETROM_T1(r15, 0x103, 0x1, &(0x7f00000013c0), &(0x7f0000001400)=0x4) r16 = dup3(r14, r13, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) write$cgroup_subtree(r16, &(0x7f0000001380)={[{0x2b, 'io'}, {0x15, 'rdma'}]}, 0xa) r17 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r17, r12) sendto$llc(r12, &(0x7f00000012c0)="9fe7d61a38e625126de698929e858e96e6270035f858f80ba11f16f44645a36adebefba65526e7e6ae8329fbb006ac90e83f29034dc19414a936738f8fa8320e8211c123cb37361ff2007be588aea5fb65b12a9a025f5a7f88a020282c7199e2d51ef212c9a56f6911b8ded057aec3724ae4b121105de3632d7553e13ab216b388164fcf641897e9c69ae971b68aa95f6c703233a95ad9d5fa798c8712e6c3de79a7f1d64c744651e8f2100bb01ea81ea2a22ecd610ed5442ea552e692", 0xbd, 0x20000003, &(0x7f0000000000)={0x1a, 0x30f, 0x1f, 0xe, 0x4, 0x4}, 0x10) 16:07:28 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000061) 16:07:28 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isi\"e', 0x3d, 0x7ff}}]}) 16:07:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:28 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0xf, &(0x7f0000000000)=""/106) 16:07:28 executing program 0: r0 = socket(0x10, 0x803, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r1) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r4 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r4, r3) r5 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r6 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r6, r5) r7 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r7, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r8 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r8, r7) r9 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r9, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r10 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r10, r9) r11 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r11, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) r12 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r12, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) r13 = socket$nl_route(0x10, 0x3, 0x0) r14 = dup3(r13, r12, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001140)='/dev/ubi_ctrl\x00', 0x80, 0x0) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4085, 0xff5}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x1, 0x0, 0x0) 16:07:28 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0xff01, &(0x7f0000000000)=""/106) 16:07:28 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000062) 16:07:28 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_\nsize'}}]}) 16:07:28 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) getpeername(r3, &(0x7f0000001240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, &(0x7f0000000000)=0x80) r4 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendto(0xffffffffffffffff, &(0x7f0000001180)="120000001200e70407000000f4afd1394349be9f217701df96eaac3ad7038789782e0447ea1e0dca874248cea8f92abe1e8f88e4f5cf692f5e8bcae80ea55d32d8b0a39a8274bf1b95b6e35231aaffb90e3945c65961b6bd64c09226ea2d3ce64481016b928e9d274b6d948db694d549ccd3b28dbbfe9578e6c76e6af2845284ff44376e5d3a6ea8d0ac6314e243c224ab89e71c7100a5e00ef9c3f2b54949b238b9704965d7115bd084d60994ab25fb9589e335f199ca45d2d89521", 0xbc, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) 16:07:28 executing program 1: prctl$PR_GET_NAME(0x10, &(0x7f0000000080)=""/45) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x0, 0x0) r1 = accept4$netrom(r0, &(0x7f0000000300)={{0x3, @null}, [@bcast, @netrom, @remote, @default, @remote, @rose, @bcast, @netrom]}, &(0x7f0000000140)=0xffffffcf, 0x800) getsockopt$bt_hci(r1, 0x0, 0x2, &(0x7f0000000180)=""/174, &(0x7f0000000240)=0xae) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000280)={'syz_tun\x00', 0x3f}) socket$vsock_dgram(0x28, 0x2, 0x0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) 16:07:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:28 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isi,e', 0x3d, 0x7ff}}]}) 16:07:28 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000063) 16:07:28 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000080)=""/98) 16:07:28 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1846}, 0xc, &(0x7f0000000480)={&(0x7f0000000580)={0xe4, r2, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1ff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1f}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ID={0x0, 0x1, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xb9c9}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffff6da1}]}, @TIPC_NLA_NET={0x0, 0x7, [@TIPC_NLA_NET_ADDR={0x0, 0x2, 0x7fff}, @TIPC_NLA_NET_ID={0x0, 0x1, 0x7}, @TIPC_NLA_NET_NODEID={0x0, 0x3, 0x7ff}, @TIPC_NLA_NET_ADDR={0x0, 0x2, 0x49b436b0}, @TIPC_NLA_NET_NODEID={0x0, 0x3, 0x200}, @TIPC_NLA_NET_ID={0x0, 0x1, 0x7ff}, @TIPC_NLA_NET_NODEID={0x0, 0x3, 0x1f}, @TIPC_NLA_NET_ADDR={0x0, 0x2, 0x4e}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x8080}, 0x30000000) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000001400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xbda61771b878abc5}, 0xc, &(0x7f00000013c0)={&(0x7f0000001280)={0x114, r2, 0x0, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0xc4, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10000}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x9800}, 0x4004) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) recvfrom$unix(r5, &(0x7f0000001180)=""/236, 0xec, 0x4532b96d468c0ba9, 0x0, 0x0) [ 573.085646] EXT4-fs: 19 callbacks suppressed [ 573.085659] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ [ 573.085659] size=0x0000000000000000" or missing value 16:07:28 executing program 1: socket$kcm(0x2b, 0x1, 0x0) r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0xffffffffffffffaa) r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x8126, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x6}, 0x100d0, 0x0, 0x4, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x1) dup2(r1, r0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r3 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r5 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r5, r4) r6 = accept$netrom(r4, 0x0, &(0x7f0000000080)) dup2(r6, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0xffffffffffffffc1) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) 16:07:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 573.192125] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=22559 comm=syz-executor.0 [ 573.207007] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isi" or missing value [ 573.261789] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=22564 comm=syz-executor.0 [ 573.279952] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ [ 573.279952] size=0x0000000000000000" or missing value 16:07:28 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) r4 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) getsockopt$inet_sctp_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x4}, &(0x7f0000001180)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000011c0)={0x8, 0x4, 0x4, 0x800, r5}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r2, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x0, 0x200297fc, &(0x7f0000e68000)={0x2, 0x0, @remote}, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x75) 16:07:28 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_\"size'}}]}) [ 573.353156] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isi" or missing value 16:07:28 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000064) 16:07:28 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isiz\"', 0x3d, 0x7ff}}]}) 16:07:28 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$SIOCNRDECOBS(r1, 0x89e2) 16:07:28 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) r4 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000001240)=[@in6={0xa, 0x4e23, 0x81, @mcast1, 0x9}], 0x1c) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000001280)) sendto$x25(r0, &(0x7f0000001180)="0ce03052ea6dfc4448185b3265b59bd2169e00142cb878e808f73df9f0e2d1894351f7c09d2156bdc999d6614e4f5e534ae56db4fd9b9df4b33065a494da4de3c12b614f48c06f0ae5dc564edecd0038a8dfbd8c4d7b9b41a74b400be3b2e6102c18ae289a8cef6316fbcf2b0292601b3a80386b926f9d59ae9d39ec3aafed9ade940e33ab926d0747c2125fb40d3b0d0b1a8b6a1d60fced40a443896593cc65de25079d569508f4db4cc395644c4e9352dba443650a8eb19067", 0xba, 0x20088044, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000001300)={'filter\x00', 0x7, 0x4, 0x3f8, 0xf0, 0x0, 0xf0, 0x310, 0x310, 0x310, 0x4, &(0x7f00000012c0), {[{{@arp={@loopback, @rand_addr=0x6, 0xffffff7f, 0xffffffff, 0x9, 0x10, {@empty, {[0x795efb2d3edda388, 0xff, 0x0, 0xdd9893e03bbe3ce7, 0xff, 0xff]}}, {@mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x62f476eaba042ee2}, {[0xff, 0x0, 0xff, 0x14274b514515f729]}}, 0x8, 0x8, 0xfffc, 0x3ff, 0x7, 0x7, 'team_slave_0\x00', 'bcsh0\x00', {0xff}, {0x1fe}, 0x0, 0xa3}, 0xc0, 0xf0}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x101, 0x32, 0x69}}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @empty, @loopback, @multicast1, 0x2, 0x1}}}, {{@arp={@remote, @dev={0xac, 0x14, 0x14, 0x28}, 0xff0000ff, 0xff000000, 0x7, 0x10, {@empty, {[0x7f, 0xff, 0x0, 0xff, 0xff, 0xff]}}, {@empty, {[0x0, 0x0, 0x0, 0x1fe, 0xff, 0x29daf7cd769eb9ca]}}, 0x7f, 0xb52, 0x3d, 0xfc00, 0xae2, 0x8, 'rose0\x00', 'ip_vti0\x00', {0xff}, {0xff}, 0x0, 0x110}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@dev={[], 0x22}, @mac=@remote, @multicast1, @empty, 0x8}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x448) 16:07:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 573.539076] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_"size=0x0000000000000000" or missing value 16:07:29 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmget$private(0x0, 0x1000, 0x80, &(0x7f0000ffe000/0x1000)=nil) shmget$private(0x0, 0x3000, 0x80, &(0x7f0000ffd000/0x3000)=nil) shmget$private(0x0, 0x1000, 0x1, &(0x7f0000ffd000/0x1000)=nil) r1 = shmget(0x0, 0x1000, 0x400, &(0x7f0000ffe000/0x1000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000100)=""/76) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x80001, 0x4e) fadvise64(r2, 0x3, 0x3, 0x1) prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x7) [ 573.629920] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz"=0x00000000000007ff" or missing value 16:07:29 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) r5 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r5, r4) getsockopt$bt_l2cap_L2CAP_CONNINFO(r4, 0x6, 0x2, &(0x7f0000000000), &(0x7f0000001180)=0x6) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040), 0x2, 0x0, 0x1aa}}], 0x1, 0x40, 0x0) 16:07:29 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = dup2(r2, r1) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000080)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f00000000c0)={'gre0\x00', 0x4}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$IMGETCOUNT(r3, 0x80044943, &(0x7f0000000100)) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) [ 573.714330] audit: type=1800 audit(1577117249.195:85): pid=22588 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16519 res=0 [ 573.749633] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_"size=0x0000000000000000" or missing value 16:07:29 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000065) 16:07:29 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_,size'}}]}) [ 573.832013] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz"=0x00000000000007ff" or missing value 16:07:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:29 executing program 0: r0 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000001180)=0x8, 0x4) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PPPIOCATTACH(r3, 0x4004743d, &(0x7f00000011c0)=0x2) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0xffffffffffffffa6, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x1, 0x10000, 0x0) 16:07:29 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isiz%', 0x3d, 0x7ff}}]}) 16:07:29 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000066) 16:07:29 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$USBDEVFS_DISCSIGNAL(r3, 0x8010550e, &(0x7f0000001180)={0x80000000, &(0x7f0000000000)="d4a0dab9497b2b52798bab0e23"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) 16:07:29 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmget$private(0x0, 0x13000, 0x1000, &(0x7f0000feb000/0x13000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000180)=""/112) [ 574.129323] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_" or missing value 16:07:29 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f0000001180)="1a3350fb02029ede371080e8075fb52219f84ffcea36d668da1b31555837bac26033cca5690d75b14531e5f9ba7b69047a962c6dad97887c6c0140e981bfda5f5e496793348f1161096149c28c701c6bb4d4f9201076a147b54be92f89573b55f344425d54553e5cab5ea3b15a65f7a6a07ed11d24a1356ea08388689d387a146618a37e1742f2e1b41970551b01ecb7109b250e515d", 0x96) connect$bt_sco(r0, &(0x7f0000000000)={0x1f, {0x80, 0x2, 0x70, 0x5, 0xd5, 0x4}}, 0x8) r3 = dup3(r2, r1, 0x0) r4 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000001280)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f0000001340)={&(0x7f0000001240)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001380)={&(0x7f00000012c0)={0x3c, r5, 0x0, 0x70bd2d, 0x25dfdbfe, {{}, {}, {0x20, 0x17, {0x0, 0x166eb7f3, @l2={'ib', 0x3a, 'veth0_to_bridge\x00'}}}}, ["", "", "", ""]}, 0x3c}}, 0x4000000) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) [ 574.188169] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz%=0x00000000000007ff" or missing value 16:07:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:29 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000067) 16:07:29 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/k\x00\x00r2@\x00\x00\x00\xb2\x00', 0x40, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000080)=0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getdents64(r5, &(0x7f00000001c0)=""/237, 0xed) r6 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r7, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r8 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r8, r7) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r11, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r9, 0x84, 0x5, &(0x7f0000002c00)={r11, @in6={{0xa, 0x4e22, 0x1ff, @loopback}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000280)={r11, @in6={{0xa, 0x0, 0x1, @local, 0xbc5}}, 0x0, 0x3f, 0x0, 0xff, 0xf4ade3832108ff31}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r7, 0x84, 0x1f, &(0x7f0000000400)={r11, @in={{0x2, 0x4e22, @empty}}, 0x80, 0x3f}, 0x90) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000340)=""/144) r12 = openat$selinux_member(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/member\x00', 0x2, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r12, 0x40286608, &(0x7f0000000300)={0x8, 0x0, 0x2, 0x100000001, 0x1, 0xfffc}) 16:07:29 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000001180)=""/172, &(0x7f0000000000)=0xac) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) 16:07:29 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_i\nize'}}]}) 16:07:29 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isiz,', 0x3d, 0x7ff}}]}) 16:07:30 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r1, 0x0) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r4 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000001180)=@known='system.posix_acl_default\x00', &(0x7f00000011c0)='vmnet0ppp1cpuset%\x00', 0x12, 0x3) dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) 16:07:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:30 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r1) r3 = dup2(r0, 0xffffffffffffffff) connect$pppoe(r3, &(0x7f0000000180)={0x18, 0x0, {0x2, @broadcast, 'bcsf0\x00'}}, 0x1e) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f00000000c0)={0x3, 0x0, 0x4, 0x440, 0x8, {0x77359400}, {0x2, 0x1, 0x7, 0x61, 0x5, 0x8d, "df406935"}, 0x7, 0x1, @fd, 0x400, 0x0, r1}) setsockopt$CAIFSO_REQ_PARAM(r4, 0x116, 0x80, &(0x7f0000000140)="5125d8f4", 0x4) r5 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r6 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r6, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r7 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r7, r6) r8 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r8, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r9 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r9, r8) r10 = perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x3e, 0x8}, 0x24, 0x8, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x0, 0x9, r9, 0x8) dup2(r10, r5) getsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080), 0x10) 16:07:30 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000068) 16:07:30 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r1) r3 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r5 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r5, r4) r6 = dup3(r1, r4, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) 16:07:30 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_i\"ize'}}]}) 16:07:30 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x22, 0x7ff}}]}) 16:07:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:30 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000069) 16:07:30 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000001200)={0x7, 0x1000}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) getsockopt$TIPC_SRC_DROPPABLE(r5, 0x10f, 0x80, &(0x7f0000000000), &(0x7f0000001180)=0x4) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) 16:07:30 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x975) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000001180)=""/4107, 0x100b}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}, 0x3ff}], 0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) dup(r3) 16:07:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:30 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x80000) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$SNDRV_PCM_IOCTL_DRAIN(r2, 0x4144, 0x0) r3 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) r6 = shmget(0x0, 0x12000, 0x0, &(0x7f0000fee000/0x12000)=nil) shmctl$SHM_INFO(r6, 0xe, 0x0) ioctl$NS_GET_OWNER_UID(r2, 0xb704, &(0x7f00000013c0)=0x0) shmctl$IPC_SET(r6, 0x1, &(0x7f0000001400)={{0x1, r5, 0xffffffffffffffff, r7, 0x0, 0x0, 0x3ff}, 0xcdc5, 0xffffffffffffffa4, 0x8e, 0x5, r4, r4, 0x4}) r8 = epoll_create1(0x80000) r9 = fcntl$dupfd(0xffffffffffffffff, 0x0, r8) ioctl$SNDRV_PCM_IOCTL_DRAIN(r9, 0x4144, 0x0) r10 = socket(0xa, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@typedef={0x8, 0x0, 0x0, 0x8, 0x1}, @volatile={0xc, 0x0, 0x0, 0x9, 0x2}]}, {0x0, [0x2e]}}, &(0x7f0000000280)=""/4096, 0x33, 0x1000}, 0x20) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) r13 = shmget(0x0, 0x12000, 0x0, &(0x7f0000fee000/0x12000)=nil) shmctl$SHM_INFO(r13, 0xe, 0x0) ioctl$NS_GET_OWNER_UID(r9, 0xb704, &(0x7f00000013c0)=0x0) shmctl$IPC_SET(r13, 0x1, &(0x7f0000001400)={{0x1, r12, 0xffffffffffffffff, r14, 0x0, 0x0, 0x3ff}, 0xcdc5, 0xffffffffffffffa4, 0x8e, 0x5, r11, r11, 0x4}) shmctl$IPC_STAT(r13, 0x2, &(0x7f0000000200)=""/104) 16:07:30 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000006a) 16:07:30 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_i#ize'}}]}) 16:07:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x1) ioctl$TCSETAW(r2, 0x5407, &(0x7f00000011c0)={0xf89, 0x0, 0x5, 0xffff, 0x7, "62ccc032593655e0"}) r3 = socket(0x10, 0x803, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000001180)=0x9, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto(r3, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r3, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) write$FUSE_GETXATTR(r6, &(0x7f0000000000)={0x18, 0x0, 0x3}, 0x18) 16:07:30 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x25, 0x7ff}}]}) 16:07:30 executing program 0: r0 = socket(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x10b000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r6, &(0x7f0000000180)="0cc817fb9a29e00eed843b21dfe7b1c07f9d81f80da871ac09ccc325ee76ddbe9a80eb9dbb26097f25899c1004487fa871c96078379740bb74fb5ad8465a85d0cabf7fc6ec4f56ffb6a055cf2d", &(0x7f0000000200)}, 0x20) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x1) dup3(r2, r1, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) r7 = gettid() rt_sigqueueinfo(r7, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffffa}) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x800, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x9, 0x44, 0x0, 0xc0, 0x0, 0x1, 0x40, 0xaaa84fa75e97957, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x383, 0x8}, 0x30, 0x3ff, 0x4, 0x1, 0x9, 0x4, 0x8}, r7, 0xf, r8, 0x1) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000001180)=""/117, 0x75}, {&(0x7f0000001200)=""/192, 0xc0}, {&(0x7f00000012c0)=""/200, 0xc8}, {&(0x7f00000013c0)=""/21, 0x15}, {&(0x7f0000001400)=""/89, 0x59}, {&(0x7f0000001480)=""/202, 0xca}], 0x6}}], 0x1, 0x0, 0x0) 16:07:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:31 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000006b) 16:07:31 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000000)="12d3d3aba670cad82b244bf20000001200e7ef007b0a0070000000087c00", 0x1e, 0x4, 0x0, 0x0) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x10d}], 0x2}}], 0x8000238, 0x0, 0x0) 16:07:31 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_i%ize'}}]}) [ 575.702922] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=28838 sclass=netlink_route_socket pig=22749 comm=syz-executor.0 16:07:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 575.748031] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=28838 sclass=netlink_route_socket pig=22755 comm=syz-executor.0 16:07:31 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000006c) 16:07:31 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x2c, 0x7ff}}]}) 16:07:31 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) syz_open_dev$dmmidi(0x0, 0x800, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) 16:07:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:31 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_i*ize'}}]}) 16:07:31 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000000)='nbd\x00') 16:07:31 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000006d) 16:07:31 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x2d, 0x7ff}}]}) 16:07:31 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) 16:07:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:31 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_i+ize'}}]}) 16:07:32 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffffa}) r2 = perf_event_open(&(0x7f0000001180)={0x3, 0x70, 0x81, 0x1f, 0x1, 0x12, 0x0, 0x81, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0xaa56d90afdaa37d0, @perf_config_ext={0x7, 0x7}, 0x8000, 0x81, 0x401, 0x9, 0x10000, 0x100, 0x8001}, r1, 0x3, 0xffffffffffffffff, 0x3) r3 = dup3(0xffffffffffffffff, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PIO_UNIMAP(r6, 0x4b67, &(0x7f0000001240)={0x3, &(0x7f0000001200)=[{0x5de, 0x7}, {0x101, 0x101}, {0x7, 0x9}]}) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) 16:07:32 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000006e) 16:07:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:32 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3b, 0x7ff}}]}) 16:07:32 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_i,ize'}}]}) 16:07:32 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x80000000006f) 16:07:32 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) r4 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r4, 0x8982, &(0x7f0000000000)={0x8, 'bond_slave_1\x00', {'bcsf0\x00'}, 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat(r7, &(0x7f0000001640)='./file0\x00', 0x400000, 0x124) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r11, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r9, 0x84, 0x5, &(0x7f0000002c00)={r11, @in6={{0xa, 0x4e22, 0x1ff, @loopback}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000280)={r11, @in6={{0xa, 0x0, 0x1, @local, 0xbc5}}, 0x0, 0x3f, 0x0, 0xff, 0xf4ade3832108ff31}, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000001680)={r11, 0xde, 0x3ff, 0x800, 0x6, 0x8}, 0x14) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) 16:07:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:32 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000070) 16:07:32 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) 16:07:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:32 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_i-ize'}}]}) 16:07:33 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000071) 16:07:33 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}, 0x22}]}) 16:07:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:33 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_i.ize'}}]}) 16:07:33 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r5 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r5, r4) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r8, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x50, 0x29b5}, &(0x7f0000000200)=0x9c) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r6, 0x84, 0x5, &(0x7f0000002c00)={r8, @in={{0x2, 0x4e21, @rand_addr=0x3f}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000280)={r8, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x3f, 0x2, 0xff, 0x27733b3b10de82b7}, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000040)={r8, 0x2}, &(0x7f00000011c0)=0x8) r10 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r10, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r10, 0x84, 0x6d, &(0x7f0000001440)=ANY=[], &(0x7f0000001300)) r11 = syz_open_dev$vcsn(&(0x7f0000001340)='/dev/vcs#\x00', 0x2, 0x11001) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r11, 0x84, 0x7b, &(0x7f0000001380)={r9, 0x5}, &(0x7f00000013c0)=0x8) r12 = dup3(r2, r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) epoll_create1(0xc0000) recvmmsg(0xffffffffffffffff, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x1, 0x2000, 0x0) r13 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r13, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) r14 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r14, 0x40086607, 0x0) ioctl$SIOCRSSL2CALL(r14, 0x89e2, &(0x7f0000000100)=@bcast) r15 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r14, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000580)={0xd0, r15, 0x25dcf884bc752dac, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'netdevsim0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'hwsim0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'irlan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @remote}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'hsr0\x00'}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3e903b4c8b4ab8ba}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}]}, 0xd0}, 0x1, 0x0, 0x0, 0x4000c800}, 0x4401d) sendmsg$IPVS_CMD_ZERO(r13, &(0x7f00000012c0)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x801000}, 0xc, &(0x7f0000001280)={&(0x7f0000001240)={0x14, r15, 0x20, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x1041}, 0x4000000) 16:07:33 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000072) 16:07:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:33 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) r5 = syz_open_dev$swradio(0x0, 0x0, 0x2) r6 = gettid() r7 = socket$inet6(0xa, 0x5, 0x0) r8 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x200004) sendfile(r7, r8, 0x0, 0x80001d00c0d0) fcntl$getownex(r7, 0x10, &(0x7f0000000540)={0x0, 0x0}) getresgid(&(0x7f0000000580)=0x0, &(0x7f00000005c0), &(0x7f0000000600)) r11 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r4, r12, 0x0) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r5, &(0x7f0000000e80)=[{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000200)=[{0x0}, {&(0x7f00000001c0)="25fe777ccac8f16f94d57b81fce50216a47a399fb495eb", 0x17}], 0x2, &(0x7f0000000780)=[@cred={{0x1c, 0x1, 0x2, {r6}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r9, 0x0, r10}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r12, r13}}}], 0x98, 0x4000000}, {&(0x7f0000000880)=@abs={0x0, 0x0, 0x4e23}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x20020041}], 0x2, 0x0) setregid(r13, 0xee01) r14 = dup3(r2, r1, 0x0) r15 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r15, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) connect$pppoe(r15, &(0x7f0000000000)={0x18, 0x0, {0x4, @link_local, 'team_slave_1\x00'}}, 0x1e) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) 16:07:33 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_i0ize'}}]}) 16:07:33 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}, 0x2d}]}) 16:07:33 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000073) 16:07:33 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001180)={0x0, r4, 0xfffffffffffffffd, 0x0, 0xbc38dff, 0x9}) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) 16:07:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 578.228347] EXT4-fs: 35 callbacks suppressed [ 578.228361] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i0ize=0x0000000000000000" or missing value [ 578.284689] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize=0x00000000000007ff-" or missing value 16:07:33 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x206002, 0x0) write$P9_RFLUSH(r4, &(0x7f0000001180)={0x7, 0x6d, 0x1}, 0x7) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) [ 578.364678] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i0ize=0x0000000000000000" or missing value 16:07:34 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_iXize'}}]}) [ 578.488333] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize=0x00000000000007ff-" or missing value 16:07:34 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r4 = perf_event_open(&(0x7f0000000440)={0x2, 0x6a, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r4, r3) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r5, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1846}, 0xc, &(0x7f0000000480)={&(0x7f0000000580)=ANY=[@ANYBLOB="e40050a6", @ANYRES16=r6, @ANYBLOB="020028bd7000fedbdf25100000003400070008000100ffffff7f08000200ff0100000c0003000100000000000000080001001f0000000c000400050000000000000018000700000001000500000008000100c9b900002400060004000200040002000400020008000100080000000400020008000100a16dffff0000070000000200ff7f0000000001000700000000000300ff0700000000000000000200b036b44900000300000200000000000000000100ff070000000003001f00000000000000000002004e000000"], 0xe4}, 0x1, 0x0, 0x0, 0x8080}, 0x30000000) sendmsg$TIPC_NL_MON_PEER_GET(r3, &(0x7f0000001500)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x81000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001180)={0x30c, r6, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0xd4, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xeb5}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffd341}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1ff}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffc}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0x3c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'veth1\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9e8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2d}]}]}, @TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1b07}, @TIPC_NLA_NET_ID={0x8}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2ffff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xff}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x200}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_MEDIA={0xc8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffe01}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x186e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb06}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3dc}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe4ca}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_BEARER={0xa0, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb85c}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e20, @remote}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fffffff}]}]}, 0x30c}}, 0x800) r7 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) 16:07:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:34 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000074) 16:07:34 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}, 0x3b}]}) 16:07:34 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x11d004, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) [ 578.795557] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iXize=0x0000000000000000" or missing value 16:07:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 578.863054] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize=0x00000000000007ff;" or missing value 16:07:34 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000075) 16:07:34 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x7) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) r4 = socket(0x1e, 0x0, 0x0) r5 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r6 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r6, r5) write(r5, &(0x7f0000000040)="99eb2bd9311c769bd8c35415af64f89ba948a47fde9ce703bf3461cdb875f6341578f284e3f0fa9dcc43f34097ee", 0x2e) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) getpeername$packet(r4, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000011c0)=0x14) recvmmsg(r0, &(0x7f0000006780)=[{{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000001280)=""/207, 0xcf}, {&(0x7f0000001380)=""/17, 0x11}], 0x2, &(0x7f0000001400)=""/107, 0x6b}, 0x4}, {{&(0x7f0000001480)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000002500)=[{&(0x7f0000001500)=""/4096, 0x1000}], 0x1, &(0x7f0000002540)=""/146, 0x92}, 0x757d}, {{&(0x7f0000002600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003b40)=[{&(0x7f0000002680)=""/4096, 0x1000}, {&(0x7f0000003680)=""/250, 0xfa}, {&(0x7f0000003780)=""/111, 0x6f}, {&(0x7f0000003800)=""/149, 0x95}, {&(0x7f00000038c0)=""/109, 0x6d}, {&(0x7f0000003940)=""/179, 0xb3}, {&(0x7f0000003a00)}, {&(0x7f0000003a40)=""/136, 0x88}, {&(0x7f0000003b00)=""/55, 0x37}], 0x9, &(0x7f0000003c00)=""/4096, 0x1000}, 0x1e2}, {{&(0x7f0000004c00)=@hci, 0x80, &(0x7f0000005140)=[{&(0x7f0000004c80)=""/139, 0x8b}, {&(0x7f0000004d40)=""/168, 0xa8}, {&(0x7f0000004e00)=""/3, 0x3}, {&(0x7f0000004e40)=""/224, 0xe0}, {&(0x7f0000004f40)=""/38, 0x26}, {&(0x7f0000004f80)=""/54, 0x36}, {&(0x7f0000004fc0)=""/216, 0xd8}, {&(0x7f00000050c0)=""/46, 0x2e}, {&(0x7f0000005100)=""/44, 0x2c}], 0x9, &(0x7f0000005200)=""/236, 0xec}, 0x2}, {{&(0x7f0000005300)=@x25, 0x80, &(0x7f0000006680)=[{&(0x7f0000005380)=""/147, 0x93}, {&(0x7f0000005440)=""/34, 0x22}, {&(0x7f0000005480)=""/4096, 0x1000}, {&(0x7f0000006480)=""/39, 0x27}, {&(0x7f00000064c0)=""/67, 0x43}, {&(0x7f0000006540)}, {&(0x7f0000006580)=""/208, 0xd0}, {&(0x7f0000006b80)=""/4096, 0x1000}, {&(0x7f0000007b80)=""/4096, 0x1000}], 0x9, &(0x7f0000006740)=""/12, 0xc}, 0xad}], 0x5, 0x0, 0x0) [ 578.959805] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iXize=0x0000000000000000" or missing value [ 579.025246] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize=0x00000000000007ff;" or missing value 16:07:34 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_icize'}}]}) 16:07:34 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}]}) 16:07:34 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000076) 16:07:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:34 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xfff, 0x100) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) [ 579.217541] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_icize=0x0000000000000000" or missing value 16:07:34 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) r4 = socket(0x1e, 0x4, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000001180)='/dev/vcsa#\x00', 0x1, 0x80000) ioctl$SNDCTL_DSP_GETODELAY(r5, 0x80045017, &(0x7f00000011c0)) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r6 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r6, r4) signalfd(r6, &(0x7f0000000000)={0x44}, 0x8) [ 579.375740] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_icize=0x0000000000000000" or missing value 16:07:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:34 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000077) 16:07:35 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000001180)='trusted.overlay.nlink\x00', &(0x7f00000011c0)={'L+', 0x1be8}, 0x16, 0x3) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) 16:07:35 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_idize'}}]}) 16:07:35 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}], [], 0x2}) 16:07:35 executing program 0: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/4097, 0x1001}, {&(0x7f00000000c0)=""/119, 0x77}], 0x2}}], 0x8000238, 0x0, 0x0) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) r5 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r5, r4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x9, 0x200, 0x80000001, 0x6, 0x0}, &(0x7f0000001180)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f00000011c0)={r6, @in6={{0xa, 0x4e22, 0x5, @remote, 0x754}}, 0x4, 0x9}, 0x90) 16:07:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) 16:07:35 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_iiize'}}]}) 16:07:35 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r4, 0x0, 0x800000000078) [ 579.857465] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16929: comm syz-executor.3: corrupted xattr entries [ 579.893542] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16484: comm syz-executor.4: corrupted xattr entries 16:07:35 executing program 0: openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0x12, 0x0, 0x0, 0xffffffffffffffbc) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x2001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000200)=0x54) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VIDIOC_QUERYBUF(r6, 0xc0585609, &(0x7f00000000c0)={0x7f, 0x2, 0x4, 0x88eb442852fe81f6, 0x10001, {}, {0x2, 0x4, 0xff, 0x0, 0x2, 0xec, "207eb87b"}, 0x2, 0x2, @userptr=0x7f, 0xf97e}) r7 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r7, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) recvmmsg(r7, &(0x7f0000002540)=[{{&(0x7f0000001180)=@l2, 0x0, &(0x7f00000023c0)=[{&(0x7f0000001200)=""/8}, {&(0x7f0000001240)=""/29}, {&(0x7f0000001280)=""/76}, {&(0x7f0000001300), 0xfffffffffffffc34}, {&(0x7f0000001340)=""/104}, {&(0x7f00000013c0)=""/4096}], 0x0, &(0x7f0000002440)=""/200}, 0xfffffffe}], 0x76, 0x0, 0x0) [ 579.963257] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16484: comm syz-executor.0: corrupted xattr entries 16:07:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 580.008507] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16593: comm syz-executor.5: corrupted xattr entries [ 580.044929] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16484: comm syz-executor.5: corrupted xattr entries 16:07:35 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7ff}}], [], 0x3}) [ 580.091006] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16484: comm syz-executor.5: corrupted xattr entries [ 580.127100] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16484: comm syz-executor.3: corrupted xattr entries [ 580.156611] EXT4-fs error (device sda1): ext4_xattr_ibody_get:591: inode #16490: comm syz-executor.5: corrupted in-inode xattr [ 580.180866] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16484: comm syz-executor.3: corrupted xattr entries [ 580.216356] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16484: comm syz-executor.3: corrupted xattr entries 16:07:35 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f0000000100)={[{@debug_want_extra_isize={'debug_want_extra_ilize'}}]}) 16:07:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x2e5, 0x10000}], 0x0, 0x0) [ 581.780194] device bridge_slave_1 left promiscuous mode [ 581.785846] bridge0: port 2(bridge_slave_1) entered disabled state [ 581.840207] device bridge_slave_0 left promiscuous mode [ 581.845734] bridge0: port 1(bridge_slave_0) entered disabled state [ 582.097572] device hsr_slave_1 left promiscuous mode [ 582.140463] device hsr_slave_0 left promiscuous mode [ 582.179649] team0 (unregistering): Port device team_slave_1 removed [ 582.218339] team0 (unregistering): Port device team_slave_0 removed [ 582.255920] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 582.320535] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 582.500503] bond0 (unregistering): Released all slaves 16:07:39 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) r1 = socket(0x8, 0x0, 0xe2) r2 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) accept(r2, 0x0, &(0x7f0000000100)) r3 = gettid() rt_sigqueueinfo(r3, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffffa}) r4 = syz_open_procfs(r3, &(0x7f0000000140)='net/rpc\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup3(r9, r8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r7, 0xc00c642d, &(0x7f0000000180)={0x0, 0x180000, r10}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup3(r13, r12, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r4, 0xc00c642d, &(0x7f00000001c0)={r11, 0x40000, r14}) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) setsockopt$packet_buf(r1, 0x107, 0x2, &(0x7f0000000080)="2622628cc48798d7a06e00b6d6c0404d5bb518f532a8794072f67405c8c1da5bda43264f5c77180f06ee60785a79fed6ba5ab81e1bed893c4928b5be4de3e15a4ae27d48a32bf9e299eea5b93dec10d330eb29e4c91916d36ee239c235ef9ca7e316f9485800c5f91b", 0x69) 16:07:40 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000140)=0xfffff7d5, 0x4) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/106) accept(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000100)=0x80) [ 587.616122] EXT4-fs error: 17 callbacks suppressed [ 587.616137] EXT4-fs error (device sda1): ext4_xattr_ibody_get:591: inode #16651: comm syz-fuzzer: corrupted in-inode xattr [ 587.675884] EXT4-fs error (device sda1): ext4_xattr_ibody_find:2193: inode #16651: comm restorecond: corrupted in-inode xattr [ 588.665040] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16679: comm syz-fuzzer: corrupted xattr entries [ 588.685143] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16679: comm syz-fuzzer: corrupted xattr entries [ 588.711422] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16679: comm syz-fuzzer: corrupted xattr entries [ 588.759727] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16679: comm syz-fuzzer: corrupted xattr entries [ 588.810730] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16679: comm syz-fuzzer: corrupted xattr entries [ 589.913570] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16680: comm syz-fuzzer: corrupted xattr entries [ 591.001595] EXT4-fs error (device sda1): ext4_xattr_ibody_get:591: inode #16681: comm syz-fuzzer: corrupted in-inode xattr [ 591.036277] EXT4-fs error (device sda1): ext4_xattr_ibody_get:591: inode #16682: comm syz-fuzzer: corrupted in-inode xattr [ 593.015811] EXT4-fs error: 7 callbacks suppressed [ 593.015828] EXT4-fs error (device sda1): ext4_xattr_ibody_get:591: inode #16688: comm syz-fuzzer: corrupted in-inode xattr [ 593.075511] EXT4-fs error (device sda1): ext4_xattr_ibody_find:2193: inode #16688: comm restorecond: corrupted in-inode xattr [ 593.300727] IPVS: stopping backup sync thread 7958 ... [ 593.310999] device bridge_slave_1 left promiscuous mode [ 593.317173] bridge0: port 2(bridge_slave_1) entered disabled state [ 593.380091] device bridge_slave_0 left promiscuous mode [ 593.389805] bridge0: port 1(bridge_slave_0) entered disabled state [ 593.440896] device bridge_slave_1 left promiscuous mode [ 593.446424] bridge0: port 2(bridge_slave_1) entered disabled state [ 593.500123] device bridge_slave_0 left promiscuous mode [ 593.509759] bridge0: port 1(bridge_slave_0) entered disabled state [ 593.561012] device bridge_slave_1 left promiscuous mode [ 593.566561] bridge0: port 2(bridge_slave_1) entered disabled state [ 593.644071] device bridge_slave_0 left promiscuous mode [ 593.663864] bridge0: port 1(bridge_slave_0) entered disabled state [ 593.724988] device bridge_slave_1 left promiscuous mode [ 593.744488] bridge0: port 2(bridge_slave_1) entered disabled state [ 593.790140] device bridge_slave_0 left promiscuous mode [ 593.803834] bridge0: port 1(bridge_slave_0) entered disabled state [ 594.142894] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16945: comm syz-fuzzer: corrupted xattr entries [ 594.175276] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16945: comm syz-fuzzer: corrupted xattr entries [ 594.201493] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16945: comm syz-fuzzer: corrupted xattr entries [ 594.241389] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16945: comm syz-fuzzer: corrupted xattr entries [ 595.300276] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16692: comm syz-fuzzer: corrupted xattr entries [ 596.199438] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16693: comm syz-fuzzer: corrupted xattr entries [ 596.255376] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16693: comm syz-fuzzer: corrupted xattr entries [ 596.287595] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16693: comm syz-fuzzer: corrupted xattr entries [ 598.092305] ================================================================== [ 598.100506] BUG: KASAN: use-after-free in ext4_xattr_set_entry+0x35e0/0x3770 [ 598.107702] Read of size 4 at addr ffff88807b709283 by task syz-fuzzer/7801 [ 598.114835] [ 598.116493] CPU: 0 PID: 7801 Comm: syz-fuzzer Not tainted 4.19.91-syzkaller #0 [ 598.123955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 598.133508] Call Trace: [ 598.136136] dump_stack+0x197/0x210 [ 598.139781] ? ext4_xattr_set_entry+0x35e0/0x3770 [ 598.144655] print_address_description.cold+0x7c/0x20d [ 598.149964] ? ext4_xattr_set_entry+0x35e0/0x3770 [ 598.154848] kasan_report.cold+0x8c/0x2ba [ 598.159034] __asan_report_load4_noabort+0x14/0x20 [ 598.163991] ext4_xattr_set_entry+0x35e0/0x3770 [ 598.168712] ? ext4_xattr_inode_read+0x450/0x450 [ 598.173483] ? __lock_is_held+0xb6/0x140 [ 598.177570] ? __might_sleep+0x95/0x190 [ 598.181551] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 598.187107] ext4_xattr_ibody_set+0x89/0x2c0 [ 598.191567] ext4_xattr_set_handle+0x5d2/0x1010 [ 598.196342] ? ext4_xattr_ibody_inline_set+0x2c0/0x2c0 [ 598.201769] ? kasan_check_write+0x14/0x20 [ 598.206049] ? security_sid_to_context_core.isra.0+0x176/0x2f0 [ 598.212152] ? security_sid_to_context_force+0x38/0x50 [ 598.217472] ? selinux_inode_create+0x30/0x30 [ 598.221983] ? get_cached_acl+0x443/0x540 [ 598.226231] ext4_initxattrs+0xc0/0x130 [ 598.230267] security_inode_init_security+0x2c8/0x3b0 [ 598.235491] ? ext4_init_acl+0x240/0x240 [ 598.239583] ? security_kernel_load_data+0xb0/0xb0 [ 598.244544] ? posix_acl_create+0x11a/0x450 [ 598.248881] ? lock_downgrade+0x880/0x880 [ 598.253205] ? ext4_set_acl+0x490/0x490 [ 598.257387] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 598.263222] ? check_preemption_disabled+0x48/0x290 [ 598.268363] ext4_init_security+0x34/0x40 [ 598.272539] __ext4_new_inode+0x3b2f/0x52d0 [ 598.277320] ? ext4_free_inode+0x1470/0x1470 [ 598.281759] ? dquot_get_next_dqblk+0x180/0x180 [ 598.286648] ? selinux_determine_inode_label+0x1b1/0x360 [ 598.292339] ext4_mkdir+0x3d5/0xdf0 [ 598.296080] ? ext4_init_dot_dotdot+0x520/0x520 [ 598.300770] ? selinux_inode_mkdir+0x23/0x30 [ 598.305196] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 598.310763] ? security_inode_mkdir+0xe4/0x120 [ 598.315389] vfs_mkdir+0x42e/0x690 [ 598.319051] do_mkdirat+0x234/0x2a0 [ 598.322689] ? __ia32_sys_mknod+0xb0/0xb0 [ 598.326845] ? do_syscall_64+0x26/0x620 [ 598.330829] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 598.336326] ? do_syscall_64+0x26/0x620 [ 598.340331] __x64_sys_mkdirat+0x76/0xb0 [ 598.344430] do_syscall_64+0xfd/0x620 [ 598.348264] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 598.353468] RIP: 0033:0x47c530 [ 598.356694] Code: 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 49 c7 c2 00 00 00 00 49 c7 c0 00 00 00 00 49 c7 c1 00 00 00 00 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 598.375730] RSP: 002b:000000c4394938e8 EFLAGS: 00000212 ORIG_RAX: 0000000000000102 [ 598.383455] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000047c530 [ 598.390747] RDX: 00000000000001c0 RSI: 000000c43835e0e0 RDI: ffffffffffffff9c [ 598.398045] RBP: 000000c439493948 R08: 0000000000000000 R09: 0000000000000000 [ 598.405349] R10: 0000000000000000 R11: 0000000000000212 R12: ffffffffffffffff [ 598.412635] R13: 0000000000000008 R14: 0000000000000007 R15: 0000000000000100 [ 598.419942] [ 598.421570] The buggy address belongs to the page: [ 598.426506] page:ffffea0001edc240 count:0 mapcount:-128 mapping:0000000000000000 index:0x1 [ 598.434955] flags: 0xfffe0000000000() [ 598.438880] raw: 00fffe0000000000 ffffea000235f088 ffffea0001879748 0000000000000000 [ 598.446901] raw: 0000000000000001 0000000000000000 00000000ffffff7f 0000000000000000 [ 598.454892] page dumped because: kasan: bad access detected [ 598.460610] [ 598.462262] Memory state around the buggy address: [ 598.467209] ffff88807b709180: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 598.474591] ffff88807b709200: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 598.481974] >ffff88807b709280: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 598.490031] ^ [ 598.493503] ffff88807b709300: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 598.501060] ffff88807b709380: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 598.508420] ================================================================== [ 598.516051] Disabling lock debugging due to kernel taint [ 599.297163] Kernel panic - not syncing: panic_on_warn set ... [ 599.297163] [ 599.304590] CPU: 0 PID: 7801 Comm: syz-fuzzer Tainted: G B 4.19.91-syzkaller #0 [ 599.313344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 599.322708] Call Trace: [ 599.325342] dump_stack+0x197/0x210 [ 599.328973] ? ext4_xattr_set_entry+0x35e0/0x3770 [ 599.333823] panic+0x26a/0x50e [ 599.337038] ? __warn_printk+0xf3/0xf3 [ 599.340962] ? ext4_xattr_set_entry+0x35e0/0x3770 [ 599.345838] ? preempt_schedule+0x4b/0x60 [ 599.349998] ? ___preempt_schedule+0x16/0x18 [ 599.354415] ? trace_hardirqs_on+0x5e/0x220 [ 599.358744] ? ext4_xattr_set_entry+0x35e0/0x3770 [ 599.363609] kasan_end_report+0x47/0x4f [ 599.367598] kasan_report.cold+0xa9/0x2ba [ 599.371769] __asan_report_load4_noabort+0x14/0x20 [ 599.376708] ext4_xattr_set_entry+0x35e0/0x3770 [ 599.381672] ? ext4_xattr_inode_read+0x450/0x450 [ 599.386466] ? __lock_is_held+0xb6/0x140 [ 599.390691] ? __might_sleep+0x95/0x190 [ 599.394714] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 599.400283] ext4_xattr_ibody_set+0x89/0x2c0 [ 599.404729] ext4_xattr_set_handle+0x5d2/0x1010 [ 599.409423] ? ext4_xattr_ibody_inline_set+0x2c0/0x2c0 [ 599.414715] ? kasan_check_write+0x14/0x20 [ 599.418964] ? security_sid_to_context_core.isra.0+0x176/0x2f0 [ 599.424963] ? security_sid_to_context_force+0x38/0x50 [ 599.430256] ? selinux_inode_create+0x30/0x30 [ 599.434899] ? get_cached_acl+0x443/0x540 [ 599.439067] ext4_initxattrs+0xc0/0x130 [ 599.443050] security_inode_init_security+0x2c8/0x3b0 [ 599.448273] ? ext4_init_acl+0x240/0x240 [ 599.452366] ? security_kernel_load_data+0xb0/0xb0 [ 599.457333] ? posix_acl_create+0x11a/0x450 [ 599.461665] ? lock_downgrade+0x880/0x880 [ 599.465821] ? ext4_set_acl+0x490/0x490 [ 599.469798] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 599.475357] ? check_preemption_disabled+0x48/0x290 [ 599.480385] ext4_init_security+0x34/0x40 [ 599.484538] __ext4_new_inode+0x3b2f/0x52d0 [ 599.488877] ? ext4_free_inode+0x1470/0x1470 [ 599.493299] ? dquot_get_next_dqblk+0x180/0x180 [ 599.497998] ? selinux_determine_inode_label+0x1b1/0x360 [ 599.503485] ext4_mkdir+0x3d5/0xdf0 [ 599.507140] ? ext4_init_dot_dotdot+0x520/0x520 [ 599.511825] ? selinux_inode_mkdir+0x23/0x30 [ 599.516240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 599.521781] ? security_inode_mkdir+0xe4/0x120 [ 599.526376] vfs_mkdir+0x42e/0x690 [ 599.529926] do_mkdirat+0x234/0x2a0 [ 599.533559] ? __ia32_sys_mknod+0xb0/0xb0 [ 599.537714] ? do_syscall_64+0x26/0x620 [ 599.541779] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 599.547195] ? do_syscall_64+0x26/0x620 [ 599.551187] __x64_sys_mkdirat+0x76/0xb0 [ 599.555261] do_syscall_64+0xfd/0x620 [ 599.559073] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 599.564260] RIP: 0033:0x47c530 [ 599.567453] Code: 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 49 c7 c2 00 00 00 00 49 c7 c0 00 00 00 00 49 c7 c1 00 00 00 00 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 599.586448] RSP: 002b:000000c4394938e8 EFLAGS: 00000212 ORIG_RAX: 0000000000000102 [ 599.594163] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000047c530 [ 599.601434] RDX: 00000000000001c0 RSI: 000000c43835e0e0 RDI: ffffffffffffff9c [ 599.608711] RBP: 000000c439493948 R08: 0000000000000000 R09: 0000000000000000 [ 599.615987] R10: 0000000000000000 R11: 0000000000000212 R12: ffffffffffffffff [ 599.623265] R13: 0000000000000008 R14: 0000000000000007 R15: 0000000000000100 [ 599.631513] Kernel Offset: disabled [ 599.635239] Rebooting in 86400 seconds..