xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x1ff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002e80)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) sendmsg$netlink(r6, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"/438, @ANYRES32=r4], 0x4}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:35:31 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000004000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0xf0ffffff}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:31 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000003000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x40000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:31 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug\"want_extra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:31 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000005100000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:31 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000004000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x100000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1932.745514] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 03:35:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0xffffff8d}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:31 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug,want_extra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:31 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000005000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1933.048743] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 03:35:31 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00006b6b6b00000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0xf0ff7f}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0xfffffff0}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:31 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000006000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev, @in6=@mcast1}, {@in6=@mcast2, 0x0, 0x32}, @in=@local, {}, {}, {}, 0x0, 0x0, 0xa, 0x1}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x0, 0x60}}]}, 0x13c}}, 0x0) fallocate(r5, 0x46, 0x6, 0x5) r6 = dup(r4) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xfffffee1}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0xf2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) ioctl$TIOCGPTLCK(r6, 0x80045439, &(0x7f00000000c0)) recvmmsg(r2, &(0x7f00000009c0)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f0000001480)=""/4088, 0x12fe}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000c40)=""/203, 0xcb}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xda}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000000d40)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000040)={0x81, 0x0, [0x7ff, 0xd4d9b2100000, 0x400, 0x100000000]}) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYRES16], 0x0) 03:35:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x2000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x4000000000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:32 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000007000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:32 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000f07000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0xf000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:32 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_\nant_extra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:32 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000008000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:32 executing program 2: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004dc0), 0x0, 0x0) socket(0x10, 0x803, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fstat(0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x14c80) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(0x0, &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000040), 0x24, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) syz_open_dev$vcsn(0x0, 0x9, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, &(0x7f0000000ac0)) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000180)=0x74000000, 0x5) recvfrom(r1, &(0x7f0000000400)=""/251, 0xfb, 0x40002001, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1, 0x3}}, 0x80) r2 = syz_open_procfs(0x0, 0x0) pivot_root(&(0x7f0000000540)='./file1\x00', &(0x7f0000000980)='./file1\x00') sendfile(0xffffffffffffffff, r2, &(0x7f0000000180)=0x74000000, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180)=0x74000000, 0x5) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xda}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f0000000280)=@sack_info={r8, 0x0, 0x3ff}, 0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000300)={r8, @in6={{0xa, 0x4e21, 0x6, @mcast2, 0x7}}, 0x2, 0x7}, &(0x7f0000000080)=0x90) 03:35:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x10000000000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:32 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000807100000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:32 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000009000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x20000380}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1933.930437] overlayfs: workdir and upperdir must reside under the same mount 03:35:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x200000000000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:32 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000a000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x66efff7f}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:32 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_\"ant_extra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:32 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000007600000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0xf00000000000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:33 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000b000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1934.565288] overlayfs: workdir and upperdir must reside under the same mount 03:35:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x2b2) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xfffffff0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r2}]]}}}]}, 0x38}}, 0x0) 03:35:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x700f0000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:33 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_,ant_extra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x1001000000000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:33 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000718000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:33 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000e000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1934.774641] EXT4-fs: 10 callbacks suppressed [ 1934.774655] EXT4-fs (sda1): Unrecognized mount option "debug_" or missing value 03:35:33 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000010000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x7fffef66}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x4002000000000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) [ 1934.915872] EXT4-fs (sda1): Unrecognized mount option "debug_" or missing value [ 1934.934683] IPv6: ADDRCONF(NETDEV_CHANGE): vti0: link becomes ready 03:35:33 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000009600000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:33 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = fanotify_init(0x8, 0x1000) fcntl$getflags(r3, 0xb) r4 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffdbc, &(0x7f0000000080)=[{&(0x7f0000000140)="240000001a0003041dfffd946f6105000200000a1f000003040008000800030004000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 03:35:33 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_w\nnt_extra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:33 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000011000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x5000000000000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x7ffff000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1935.212230] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:34 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xfffffee1}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0xf2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f0000000000)={0x2, 0x0, [0x1, 0x4, 0x3f, 0xffffffbf, 0xfffffffa, 0x3259, 0x7fff, 0x5181]}) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) open(0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000f59ffc)=0x4, 0x4) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000003c0)="3c6f8c3f68a46015946450540ab77d8d023f8bfa1f54577effc2db2b23545af3e639f51a355592b18a2e75c7", 0x2c}, {&(0x7f0000000400)}, {&(0x7f0000000180)="e58a82455fec74e0e02593b005a1527cbed2d565be57a240c9c66b5ed00011f3799ac6204660f87d43d9e8f80602e7f26402cc45eb3a561ae4d8eb4c592143a958a3c7fc87893a1838859666789bf5f2923db2867f12d04ce6", 0x59}, {&(0x7f00000002c0)="bba3ae4565888468f8883782083a57473410bd2461e92220adc7c6f84f51dde8093ff9e847e2f22186bac113d054c5e62a123834e18c1dc2b000fe47dde47f9e9915", 0x42}], 0x4) write(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fd, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) [ 1935.317166] EXT4-fs (sda1): Unrecognized mount option "debug_w [ 1935.317166] nt_extra_isize=0x0000000000000e22" or missing value 03:35:34 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00000070f000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:34 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000017000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x80020000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x8000000000000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) [ 1935.491479] EXT4-fs (sda1): Unrecognized mount option "debug_w [ 1935.491479] nt_extra_isize=0x0000000000000e22" or missing value 03:35:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x80030020}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x8dffffff00000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:34 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_w\"nt_extra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:34 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000023000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:34 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000001000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x8dffffff}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1936.016625] EXT4-fs (sda1): Unrecognized mount option "debug_w"nt_extra_isize=0x0000000000000e22" or missing value 03:35:34 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000060000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:35 executing program 2: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$unix(0x1, 0x10004000000002, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) dup3(r1, r6, 0x100000) lseek(r2, 0x7ffffc, 0x0) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r2, 0x100000003, 0x0, 0x28120001) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYPTR], 0x8) fallocate(r0, 0x100000003, 0x0, 0x28120001) 03:35:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0xa00e000000000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:35 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000002000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1936.261102] EXT4-fs (sda1): Unrecognized mount option "debug_w"nt_extra_isize=0x0000000000000e22" or missing value 03:35:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x90000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:35 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000fc000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:35 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_w%nt_extra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0xb00f000000000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:35 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000003000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0xf0ffffff}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc"}, 0x60) sendmmsg$nfc_llcp(r0, &(0x7f0000009300)=[{&(0x7f0000000080)={0x27, 0x0, 0x1, 0x0, 0x0, 0x15, "9465effb155fbb9f09ffa15bc95cfddfac37a822a1560030d8bb4576ba8ff2de9cb5b7fd5bf3a0cacd5265187683dc5de0a5fb04b9fe783dadcbab5a0616f3", 0x2f}, 0x60, 0x0, 0x0, 0x0, 0x0, 0x1010}, {0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, &(0x7f00000041c0)={0x10}, 0x10}], 0x3, 0x20000100) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000140)={[0xce, 0x1, 0xffff, 0x100000001, 0x6, 0x9, 0x0, 0xffffffff, 0x10001, 0xbec, 0xfffffffffffffff9, 0xfffffffffffff801, 0x1, 0xff, 0xfffffffffffffffb, 0x1], 0x6000, 0x80}) 03:35:35 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000030000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1936.664117] EXT4-fs (sda1): Unrecognized mount option "debug_w%nt_extra_isize=0x0000000000000e22" or missing value 03:35:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0xf0ffffff00000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0xffffff8d}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1936.795970] EXT4-fs (sda1): Unrecognized mount option "debug_w%nt_extra_isize=0x0000000000000e22" or missing value 03:35:35 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x20000000000, 0x0) tkill(r0, 0x1) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:35:35 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000050000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:35 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000004000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:35 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_w,nt_extra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xffffffff, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) 03:35:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0xffffffff00000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:35 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000060000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0xfffffff0}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1937.209568] EXT4-fs (sda1): Unrecognized mount option "debug_w" or missing value 03:35:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:36 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000002004000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:36 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000070000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1937.367425] EXT4-fs (sda1): Unrecognized mount option "debug_w" or missing value 03:35:36 executing program 2: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x100, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d2, &(0x7f00000009c0)="1747b6914ea48d7f1cfc6dc72bfcf826a7de7ce7adde84120e20675350cb7b158be932f3e1174cf13b70d61649e628e2338d7eab237ed13f6da181ee15bbb1b9380063b47219376099511eb97deb56a2ac39fb26b0ed05ce1067f96e1d376222f2da6a681157c4f66e4727602e272ed50ee1daeea9d874c2b40856f80857d64444a04bd90e6d47e785faa5e1b81e42f43a59913c0cac8690ca9156926321ffcffc97f309bf50b6c28cbb628695beeffc8ae9fef830a61fb15998a66f4dd13574bd3b71") r0 = open(&(0x7f0000000000)='./bus\x00', 0x1418c2, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x885eb256380c18fe}, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) lsetxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000380)='trusted.overlay.redirect\x00', &(0x7f0000000540)='./bus\x00', 0x6, 0x1) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xfffffee1}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0xf2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) setsockopt$netrom_NETROM_T4(r3, 0x103, 0x6, &(0x7f0000000080)=0x1ff, 0x4) 03:35:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x7ffffffff000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:36 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_wa\nt_extra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:36 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000090000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:36 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000005000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:36 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'lo\x00\t\x00\x00\x00\x00\x00\x00\xfc\x00', 0x0}) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000080)=0x32, 0x2c7) setsockopt$inet_int(r2, 0x0, 0x32, &(0x7f0000000f00)=0x1000000, 0x4) sendmmsg$inet(r2, &(0x7f0000004940)=[{{&(0x7f0000000040)={0x2, 0x4e21, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000000280)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @dev={0xac, 0x14, 0x14, 0x1c}, @multicast2}}}], 0x20}}], 0x1, 0x0) 03:35:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x4000000000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x4}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:36 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000000a0000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:36 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000006000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:36 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_wa\"t_extra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0xf}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:36 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000000b0000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x10000000000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:36 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev, @in6=@mcast1}, {@in6=@mcast2, 0x0, 0x32}, @in=@local, {}, {}, {}, 0x0, 0x0, 0xa, 0x1}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x0, 0x60}}]}, 0x13c}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000380)) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xfffffee1}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0xf2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) ioctl$IMDELTIMER(r3, 0x80044941, &(0x7f0000000300)=0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000001c0)=0xc) r5 = getuid() setreuid(0x0, r5) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0612687463915e38802a9d8aea872843afd874e2f98b479a7316270146d0e02f8e63ba8863cd7dcc6760253efe91ed52727c4e74aa1acb778df33c3853533db739f65d4e1e427d0a6ef5516918738d72aae3f1258c830df5b", 0x66, 0x400}], 0x0, &(0x7f0000000200)={[{@grpid='grpid', 0x7}], [{@obj_type={'obj_type', 0x3d, 'ext3\x00'}}, {@subj_type={'subj_type'}}, {@obj_role={'obj_role', 0x3d, '^'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@euid_eq={'euid', 0x3d, r4}}, {@permit_directio='permit_directio'}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@uid_lt={'uid<', r5}}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}) [ 1938.234085] EXT4-fs (loop2): Unrecognized mount option "grpidobj_type=ext3" or missing value 03:35:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x10}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:37 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000000e0000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0xf0ff7f00000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:37 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000008008000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1938.385344] EXT4-fs (loop2): Unrecognized mount option "grpidobj_type=ext3" or missing value 03:35:37 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_wa%t_extra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:37 executing program 2: 03:35:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x50}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:37 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000110000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0xf0ffffff7f0000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:37 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00000000011b000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:37 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @dev}, 0x1c) sendto$inet6(r0, &(0x7f00000009c0)="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", 0x534, 0xc001, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000003c0)="3ce95c98b66a9cdea42aca63276ef1eca3f038047504ba09072b9792bbe041c012d015e0f9cdf7aa7a4d18766deff9a2735edc11437a10c0e9f265c48e7033f01161d5ca1babf5738b4c3df116d964712d2c577d1181a2a242ab4ada0b6cd45c1f36c27a7453575b33cdd7300a74dd585eab465795dccddd26", 0x79, 0x400c000, 0x0, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140)=0x4, 0x4) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000), 0x4) 03:35:37 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000170000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x110}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x200000000000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:37 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_wa,t_extra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000fed000/0x1000)=nil, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x8}, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffe, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev, @in6=@mcast1}, {@in6=@mcast2, 0x0, 0x32}, @in=@local, {}, {}, {}, 0x0, 0x0, 0xa, 0x1}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x0, 0x60}}]}, 0x13c}}, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x10000, 0x0) dup3(r1, r2, 0x80000) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f00000001c0)={0x75, 0x0, 0x39c, 'queue1\x00'}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000180)={'veth1_to_bond\x00', &(0x7f0000000080)=@ethtool_rxfh_indir={0x25}}) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x0, 0x40, 0x7f, 0x3f, 0x0, 0x7, 0x20000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0xc}, 0x18404, 0x9, 0x0, 0x0, 0x61, 0x6d7, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) umount2(&(0x7f0000000540)='./file0\x00', 0x4) clock_gettime(0x0, &(0x7f0000000600)) 03:35:37 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000006b6b6b000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:37 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000001f0000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x240}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:38 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000480000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:38 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000230000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0xea0}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0xf00000000000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:38 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_wan\n_extra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, &(0x7f0000000000)={0x2, "36d0f4119a5ba790c553fd6f8bc9b7ce1b421dc6794d82248e620cde9e155938", 0x3, 0x1}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x29800, 0x8404, 0x0, [], [{}, {0x801, 0x0, 0x80000001, 0x0, 0xffffffffffffffff}]}) syz_open_procfs(0x0, &(0x7f0000000080)='net/llc\x00') 03:35:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0xf00}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:38 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000003f0000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:38 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000fffffdef000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x66efff7f00000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:38 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f000002eff0), 0x10) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x80001, 0x0) write$P9_RWALK(r0, &(0x7f00000005c0)={0x71, 0x6f, 0x2, {0x8, [{0x40, 0x0, 0x4}, {0x4, 0x4, 0x7}, {0x248ae67fa1a31a28, 0x2, 0x8}, {0x6e, 0x2, 0x4}, {0x1, 0x1, 0x5}, {0x4, 0x3, 0x6}, {0x40, 0x3, 0x7}, {0x4, 0x3, 0x8}]}}, 0x71) getpeername(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f00000003c0)=0xe8) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000400)=r2) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x200441, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r3, 0x6, 0x15, &(0x7f0000000340)=0x5, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r4 = inotify_init1(0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$IP_VS_SO_GET_TIMEOUT(r5, 0x0, 0x486, &(0x7f00000001c0), 0x0) fsetxattr$trusted_overlay_upper(r4, &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="a9ee82fefd16f88c00fba900009f9029cd1a94732380eb5d42bc1ac8431271d31a30e4f9d617468deaf5a99b44e6771604fd0b9dea874c4d56bdf24851e1f63ce3c3a6eef597d6d15366240b7bdf438f644f274941f03f8ff0592c070da742edf5553f89cd6db0ff1a8427b0da6db154fed8e5e06bc3722c56"], 0x1, 0x1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) open(0x0, 0x1fe, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="300000001000afaf00"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000000008000d0000000000"], 0x30}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 03:35:38 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000400000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:38 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_wan\"_extra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0xfb0}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:38 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000600000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x700f000000000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1939.915722] audit: type=1400 audit(2000000138.620:437): avc: denied { getopt } for pid=29335 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 03:35:38 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000fffffffe000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:38 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="3c010000100013070000000000000000fe800000000000000000000000000000ff01000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff0200000000000000000000000000010000000032000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00010000000000000000004c001200726663343130362867636d28616573292900000000000000ffffffffffffffe800000000000000000000000000000000000000000000000000000000000000000000000060000000"], 0x13c}}, 0x0) listen(r0, 0x800) syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYRES32], &(0x7f0000000100)={0x0, 0x1000000, [0x4, 0x0, 0x0, 0xffffffff]}) connect$caif(0xffffffffffffffff, &(0x7f00000001c0)=@dbg={0x25, 0xf4, 0x5}, 0x18) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xfffffee1}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0xf2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) write$FUSE_STATFS(r3, &(0x7f0000000200)={0x60, 0x0, 0x2, {{0x101, 0x1ff, 0x73, 0x10000, 0x7fff, 0xffff, 0xcb2, 0x80000000}}}, 0x60) 03:35:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x1001}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) [ 1940.064516] EXT4-fs: 10 callbacks suppressed [ 1940.064533] EXT4-fs (sda1): Unrecognized mount option "debug_wan"_extra_isize=0x0000000000000e22" or missing value 03:35:38 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000fe800000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x8000000000000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1940.232638] EXT4-fs (sda1): Unrecognized mount option "debug_wan"_extra_isize=0x0000000000000e22" or missing value 03:35:39 executing program 2: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x801}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000080)=0x3ff, 0x4) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 03:35:39 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_wan%_extra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x4002}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:39 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000fec00000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:39 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000effdffff000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x8002000000000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:39 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000fc0000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1940.557599] EXT4-fs (sda1): Unrecognized mount option "debug_wan%_extra_isize=0x0000000000000e22" or missing value 03:35:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x5000}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) [ 1940.619267] net_ratelimit: 10 callbacks suppressed [ 1940.619275] protocol 88fb is buggy, dev hsr_slave_0 [ 1940.629414] protocol 88fb is buggy, dev hsr_slave_1 [ 1940.634578] protocol 88fb is buggy, dev hsr_slave_0 [ 1940.639683] protocol 88fb is buggy, dev hsr_slave_1 [ 1940.644846] protocol 88fb is buggy, dev hsr_slave_0 [ 1940.649960] protocol 88fb is buggy, dev hsr_slave_1 03:35:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x8003002000000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:39 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000feffffff000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1940.780408] EXT4-fs (sda1): Unrecognized mount option "debug_wan%_extra_isize=0x0000000000000e22" or missing value 03:35:39 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000080fe0000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:39 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_wan,_extra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) [ 1941.166068] EXT4-fs (sda1): Unrecognized mount option "debug_wan" or missing value [ 1941.263681] EXT4-fs (sda1): Unrecognized mount option "debug_wan" or missing value 03:35:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0xa00e}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x8dffffff00000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:40 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000c0fe0000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:40 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00000000000000000fe80001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:40 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want\nextra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:40 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$unix(r2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000010000e9601ba09432587738f3d06262d6c58fe2ab5a21f637d6e2", @ANYRES64=r0], 0x18}, 0x0) close(r0) connect$unix(r1, &(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 03:35:40 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000ff0000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0xb00f}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) [ 1941.558448] EXT4-fs (sda1): Unrecognized mount option "debug_want [ 1941.558448] extra_isize=0x0000000000000e22" or missing value 03:35:40 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000020000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x9000000000000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:40 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(r0, 0x10c, 0x4, &(0x7f00000000c0), &(0x7f0000000240)=0x4) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000040)=0x3) 03:35:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x40000}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:40 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000400300c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1941.712259] EXT4-fs (sda1): Unrecognized mount option "debug_want [ 1941.712259] extra_isize=0x0000000000000e22" or missing value 03:35:40 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want\"extra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:40 executing program 2: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x5, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000a80)={r2, r0, 0x2, 0xa4, &(0x7f00000009c0)="e40dc97c5bfc33bff6c3170d9717a9c299c40d9da496c762f09b5a40ce8523fbc2f2da838198a42679dde45d90991967803d5712e795931d4acc6ffda89994a9bd4b61753fed3f3301a29bee36c3ead92739b5a3397adc6c75dab542657ea90a76a6297b9e6598088a5d2695246eee59c80eb07e1bebadc89d30660ab6a7c22df7ce97ec4116cb8632e63e73716e7de1aacb4b7acf3adbc1291e26c3457614f8d7c388f7", 0x4, 0x8, 0xfffe, 0x35dc, 0x6, 0x3, 0x4, 'syz0\x00'}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r0, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xfffffee1}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0xf2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r4, 0x80089203, 0x2000000) 03:35:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x100000}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:40 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000030000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:40 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000400c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x2000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) [ 1942.113629] EXT4-fs (sda1): Unrecognized mount option "debug_want"extra_isize=0x0000000000000e22" or missing value 03:35:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0xf0ffffff00000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:41 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000001000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1942.243255] EXT4-fs (sda1): Unrecognized mount option "debug_want"extra_isize=0x0000000000000e22" or missing value 03:35:41 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x204900, 0x0) getpeername$ax25(r2, &(0x7f0000000100)={{0x3, @bcast}, [@null, @netrom, @remote, @rose, @default, @default, @bcast, @rose]}, &(0x7f0000000780)=0x48) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f0000000600)}}, 0x10) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) r4 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000040)) semctl$IPC_RMID(r4, 0x0, 0x0) semctl$GETALL(r4, 0x0, 0xd, &(0x7f00000007c0)=""/4096) sendmmsg(r3, &(0x7f0000000180), 0x11996fa2b469d35, 0x0) 03:35:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0xf000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:41 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000040000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:41 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want,extra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:41 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000034000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0xffffffff00000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0xc502, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 03:35:41 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000001c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:41 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000050000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x10010000}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:41 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000002c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:41 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000700)='/dev/vcs#\x00', 0x1, 0x4302) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffff13, 0x9b, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r0, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$radio(0x0, 0x3, 0x2) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000000)={0x7, "c057a4f08db49470e6b152ad5c0b44cef5dc2caea010bf04d1d605065b6dfa07", 0x1, 0xe205c3d767410aa}) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x5) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x1000000000054}, 0x98) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha256\x00'}, 0xfffffffffffffce4) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r7 = accept$alg(r6, 0x0, 0x0) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r8, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r9 = accept$alg(r8, 0x0, 0x0) r10 = dup(r9) write$UHID_DESTROY(r10, &(0x7f0000000080), 0xfff2) recvmmsg(r10, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f0000001480)=""/4092, 0xffc}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xda}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f00000009c0)=""/178, 0xb2}, {&(0x7f0000000900)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) openat$cgroup_ro(r10, &(0x7f0000000180)='cpuacct.usage_all\x00', 0x0, 0x0) r11 = dup(r7) write$UHID_DESTROY(r11, &(0x7f0000000080), 0xfff2) recvmmsg(r11, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xda}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/102, 0x66}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}, 0x2}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f00000008c0)=""/37, 0x25}}], 0xa, 0x0, 0x0) write$FUSE_GETXATTR(r11, &(0x7f0000000080)={0x18, 0x0, 0x6, {0x1}}, 0x18) sendfile(r5, 0xffffffffffffffff, 0x0, 0x8080fffffffe) 03:35:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x40020000}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:41 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_\nxtra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:41 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000060000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:41 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000003c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:41 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) faccessat(r0, &(0x7f0000000200)='./file0\x00', 0x44, 0x800) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r3 = dup(r2) write$FUSE_BMAP(r3, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xfffffee1}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0xf2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r6, 0x40086424, &(0x7f00000003c0)={r7, 0x1}) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000440), 0x24, 0x0) ioctl$IMDELTIMER(r3, 0x80044941, &(0x7f0000000540)=0x2) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x400000, 0x0) 03:35:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xf}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x50000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:42 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000004c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:42 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_\"xtra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:42 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000001b0100000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x8dffffff}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) [ 1943.477968] 9pnet: bogus RWRITE count (2 > 1) 03:35:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x10}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:42 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="850000002e00000047000000000000009500140000000000b1d8be4c8c0cbb0d0fd475ce7717395c4f86ca748fea3cb8c97d77d3aa18ce80c8b70126dde255482cf6c62d9a3c9b149c606bf06c8b483c156753c1f35ae395148c37947ce071486b24e262d109"], &(0x7f0000000180)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6(0x10, 0x8000000100000003, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000140)=r1, 0x4) r5 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r5, 0x1, 0x6, &(0x7f0000000100)=0x32, 0x4) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xfffffee1}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0xf2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(r8, 0xc0745645, &(0x7f00000002c0)={0x3, [0x9, 0x5a6, 0x9, 0x1, 0x7c3, 0x7, 0xffff, 0xb0, 0x2, 0x8, 0x5e, 0x1, 0xdad, 0x3f0, 0x7, 0xb849, 0xe4c, 0x2, 0xc6d, 0x7, 0x6, 0x40, 0x5737, 0x2, 0x7, 0x3, 0x101, 0x3ff, 0x4, 0x2400, 0x341, 0x23, 0x200, 0x4, 0x7fff, 0x1, 0x40, 0xf9, 0x3, 0x5, 0x6, 0x1, 0x7fff, 0x6, 0x9, 0x12b2, 0x81, 0x8f], 0x6}) connect$inet(r5, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) sendmmsg(r5, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 03:35:42 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000005c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0xa00e0000}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x90}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:42 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000006c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:42 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000300000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:42 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_%xtra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0xb00f0000}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:42 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000007c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x280}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0xf0ffffff}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:42 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000008c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xf00}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:43 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000800400000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:43 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_,xtra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:43 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000009c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0xffffff8d}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:43 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffff, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x3f}, 0x10) r1 = getuid() setreuid(0x0, r1) r2 = getuid() setreuid(0x0, r2) r3 = getuid() setreuid(0x0, r3) mount$bpf(0x0, &(0x7f0000000140)='./file0//ile0\x00', &(0x7f0000000200)='bpf\x00', 0x240000, &(0x7f00000009c0)={[], [{@uid_lt={'uid<', r3}}, {@euid_lt={'euid<', r1}}, {@dont_appraise='dont_appraise'}, {@dont_appraise='dont_appraise'}, {@smackfshat={'smackfshat'}}, {@appraise='appraise'}, {@fowner_eq={'fowner', 0x3d, r2}}]}) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev, @in6=@mcast1}, {@in6=@mcast2, 0x0, 0x32}, @in=@local, {}, {}, {}, 0x0, 0x0, 0xa, 0x1}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x0, 0x60}}]}, 0x13c}}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080)=0x8, 0x4) setgid(r5) mount(0x0, &(0x7f0000000040)='./file0//ile0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) fcntl$dupfd(0xffffffffffffffff, 0xe09, 0xffffffffffffffff) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f0000001480)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xda}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0xfffffffffffffed7}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f00000008c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) bind$rds(r8, &(0x7f0000000300)={0x2, 0x4e22, @remote}, 0x10) r9 = syz_open_procfs(0x0, &(0x7f0000000600)='net/fib_trie\x00') ioctl$SCSI_IOCTL_DOORLOCK(r9, 0x5380) syz_open_dev$mice(0x0, 0x0, 0x100) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000001c0)={0x2f, 0x5, 0x0, {0x0, 0x0, 0x101}}, 0x30) 03:35:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xf70}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0xfffffff0}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:43 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000000000ac00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:43 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000500000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:43 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_e\ntra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x700f}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:43 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000000000bc00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bind$unix(r2, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) mount$9p_unix(&(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000280)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='trans=unix']) 03:35:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}, 0x2}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:43 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000600000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:43 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000000000ec00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x8002}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1945.158558] EXT4-fs: 11 callbacks suppressed [ 1945.158571] EXT4-fs (sda1): Unrecognized mount option "debug_want_e [ 1945.158571] tra_isize=0x0000000000000e22" or missing value [ 1945.159571] 9pnet: p9_fd_create_unix (29827): problem connecting socket: éq‰Y’3aK: -111 03:35:44 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_e\"tra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) [ 1945.296978] 9pnet: p9_fd_create_unix (29845): problem connecting socket: éq‰Y’3aK: -111 03:35:44 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000010c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}, 0x4}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:44 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) eventfd(0x9) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vxcan1\x00', 0xcd) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x200, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000100)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xfffffee1}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0xf2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) ioctl$RTC_EPOCH_READ(r5, 0x8008700d, &(0x7f0000000200)) getsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000040)=""/51, &(0x7f0000000080)=0x33) sendto$inet(r0, &(0x7f0000000140)='^', 0x34000, 0xfc, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0xfffffffffffffd75) getsockopt$inet6_tcp_int(r2, 0x6, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 03:35:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x9000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:44 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000011b00000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:44 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000011c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1945.562347] EXT4-fs (sda1): Unrecognized mount option "debug_want_e"tra_isize=0x0000000000000e22" or missing value 03:35:44 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xfffffee1}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0xf2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) connect$unix(r3, &(0x7f0000000180)=@abs={0x1, 0x0, 0x4e22}, 0x6e) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 03:35:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}, 0xf}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1945.780980] EXT4-fs (sda1): Unrecognized mount option "debug_want_e"tra_isize=0x0000000000000e22" or missing value 03:35:44 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000017c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:44 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000042000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:44 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_e%tra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}, 0x10}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x10) sendto$inet(r1, &(0x7f0000000140)="bec1c1e0650da46dc621af8208a9fa82fde7a68b7a33f8f21ab475695700365fb54b496a953019240268dfd2b30cb1e270ba0f3966b2cd702503dd95005d2f", 0x3f, 0x402082c, &(0x7f0000000180)={0x2, 0x4e24, @remote}, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@quota_quantum={'quota_quantum'}}]}) 03:35:44 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000000001fc00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}, 0x50}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:44 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000004000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1946.222901] EXT4-fs (sda1): Unrecognized mount option "debug_want_e%tra_isize=0x0000000000000e22" or missing value [ 1946.229705] gfs2: quota_quantum mount option requires a positive numeric argument [ 1946.279930] gfs2: can't parse mount arguments 03:35:45 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000023c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ff7f}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}, 0x110}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) [ 1946.389230] EXT4-fs (sda1): Unrecognized mount option "debug_want_e%tra_isize=0x0000000000000e22" or missing value [ 1946.403866] gfs2: quota_quantum mount option requires a positive numeric argument [ 1946.447185] gfs2: can't parse mount arguments 03:35:45 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000005100000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:45 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_e,tra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:45 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000e2d4f32ec00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}, 0x240}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:45 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x60c02, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev, @in6=@mcast1}, {@in6=@mcast2, 0x0, 0x32}, @in=@local, {}, {}, {}, 0x0, 0x0, 0xa, 0x1}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x0, 0x60}}]}, 0x13c}}, 0x0) sendfile(r3, r0, &(0x7f0000000080), 0x6) r4 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x62a, 0x200000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) 03:35:45 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000000003fc00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1946.828875] EXT4-fs (sda1): Unrecognized mount option "debug_want_e" or missing value 03:35:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80013, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffdff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x3c) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, &(0x7f00000002c0)=[{&(0x7f0000001580)}], 0x1}, 0x5c00) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000100)={0x0, 0x5, 0x2, 0x6, 0x0, 0xb1ec, 0x6}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r5, r6) 03:35:45 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000007600000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}, 0xea0}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:45 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000040c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1946.971469] EXT4-fs (sda1): Unrecognized mount option "debug_want_e" or missing value 03:35:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}, 0xf00}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:45 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_ex\nra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:45 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000060c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:45 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000048000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:45 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYCAP(r3, 0x80685600, 0x0) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) fdatasync(r1) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000100)=0x100) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) read$alg(r5, &(0x7f00000001c0)=""/26, 0x1a) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r7 = accept$alg(r6, 0x0, 0x0) r8 = dup(r7) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xfffffee1}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0xf2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x2) ioctl$int_in(r9, 0x5421, &(0x7f0000000240)=0x6) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r10 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r4, 0x4040ae77, &(0x7f00000000c0)) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) r11 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r11, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@mcast1, @in6=@mcast1}, {@in6=@mcast2, 0x0, 0x32}, @in6=@empty, {0x0, 0x1}, {}, {0xfffffffe, 0x0, 0xfffffffd}, 0x0, 0x0, 0xa, 0x1}, [@algo_aead={0x4c, 0x12, {{'aegis128l-aesni\x00'}, 0x0, 0x80}}]}, 0x13c}, 0x1, 0x0, 0x0, 0x800}, 0x0) r12 = dup2(r2, r11) ioctl$KVM_HYPERV_EVENTFD(r12, 0x4018aebd, &(0x7f0000000200)={0x2, r3}) ioctl$KVM_SET_REGS(r10, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x7, 0x0, 0x0, 0x0, 0x7, 0x4cb]}) ioctl$KVM_RUN(r10, 0xae80, 0x0) ioctl$KVM_RUN(r10, 0xae80, 0x0) 03:35:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x66efff7f}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}, 0xfb0}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:46 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000ffffff8dc00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1947.437880] EXT4-fs (sda1): Unrecognized mount option "debug_want_ex [ 1947.437880] ra_isize=0x0000000000000e22" or missing value 03:35:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}, 0x1001}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:46 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000088000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x700f0000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1947.631616] EXT4-fs (sda1): Unrecognized mount option "debug_want_ex [ 1947.631616] ra_isize=0x0000000000000e22" or missing value 03:35:46 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000002ef3d4e2c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:46 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000009600000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:46 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_ex\"ra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}, 0x4002}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffef66}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1948.036994] EXT4-fs (sda1): Unrecognized mount option "debug_want_ex"ra_isize=0x0000000000000e22" or missing value 03:35:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffff000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:46 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000fffffff5c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}, 0x5000}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:46 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000fdef00000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:46 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) lstat(&(0x7f0000000380)='./control\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000280)='./control\x00', 0x0, r3) write$P9_RGETATTR(r1, &(0x7f0000000280)={0xa0, 0x19, 0x1, {0x100, {0x6, 0x0, 0x5}, 0x40, r2, r3, 0x6, 0x8, 0x6, 0x7ff, 0x7, 0x0, 0x525, 0x38, 0x5, 0x63d, 0x7, 0x33, 0x0, 0x6, 0x6}}, 0xa0) ioctl$TUNSETVNETBE(r1, 0x400454de, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffe64, 0x0, r0}, 0x30) r4 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$SG_GET_RESERVED_SIZE(r4, 0x2272, &(0x7f0000000040)) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="02000f00000a00000000ff07000000000000000000000000000000000000000000004200000000000000018000000000000300000000000000000000000055aa", 0x40, 0x1c0}]) 03:35:47 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000000000fcc00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:47 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_ex%ra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x80020000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:47 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000effd00000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}, 0xa00e}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) [ 1948.411972] ldm_validate_privheads(): Disk read failed. [ 1948.458023] loop2: p1 < > p3 [ 1948.491801] loop2: partition table partially beyond EOD, truncated 03:35:47 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000000080fec00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1948.564169] loop2: p1 size 2 extends beyond EOD, truncated 03:35:47 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000040000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}, 0xb00f}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) [ 1948.648760] loop2: p3 size 32769 extends beyond EOD, truncated 03:35:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x80030020}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:47 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000000c0fec00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}, 0x40000}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:47 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140)=0x9, 0x4) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001380)={&(0x7f0000000040)={0x2, 0x0, @local}, 0x10, 0x0, 0x0, &(0x7f0000001240)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0, 0x15}, &(0x7f0000000180)=[{&(0x7f0000000080)=""/21, 0x15}], 0x1, 0x1a0ffffffff}}], 0x48}, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x882, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r3, 0x6, 0x1, &(0x7f0000000100)={0x5, 0x6, 0x0, 0x9, 0x20, 0x8}, 0xc) 03:35:47 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_ex,ra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:47 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000051000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}, 0x100000}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:47 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000fffffffec00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1949.177368] rdma_op 0000000037e9d988 conn xmit_rdma (null) [ 1949.196444] rdma_op 00000000ba16f28c conn xmit_rdma (null) 03:35:48 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x8, 0x55, 0x0, 0x1b0001}, [@ldst={0xffffffbd}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x6c0, &(0x7f00000001c0)=""/195}, 0x48) r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x30, 0x690000) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r0, 0xc0305616, &(0x7f0000000140)={0x0, {0x7ff, 0xc2}}) 03:35:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x90000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:48 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_ext\na_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:48 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000000000ffc00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}, 0x2000000}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:48 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000006b6b6b000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:48 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000007fffffffc00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:48 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x200) syz_open_procfs(0x0, &(0x7f0000272000)) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x100) r3 = getuid() setreuid(0x0, r3) lstat(&(0x7f0000000100)='\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r2, &(0x7f00000001c0)={0x90, 0x0, 0x3, {0x4, 0x3, 0x3, 0x81, 0x6, 0x7fff, {0x0, 0x7fffffff, 0x6, 0x7e, 0x401, 0x8000, 0x6, 0xffffffff, 0xfffffffb, 0x1f, 0x140a, r3, r4, 0x8, 0x7d3}}}, 0x90) 03:35:48 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00000000f070000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}, 0xf000000}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:48 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_ext\"a_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:48 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000008dffffffc00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:48 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x6, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30}, {@in6=@mcast2, 0x0, 0x32}, @in=@local, {}, {}, {}, 0x0, 0x0, 0xa, 0x1}, [@algo_aead={0x28, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x0, 0x60}}]}, 0xd8}}, 0x0) r2 = fcntl$dupfd(r1, 0x203, 0xffffffffffffffff) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f0000000000), 0x2) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000040)={0x1, 0x101}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) 03:35:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}, 0x10010000}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}, 0x40020000}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:48 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000f5ffffffc00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:48 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000008071000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1950.224660] EXT4-fs: 8 callbacks suppressed [ 1950.224672] EXT4-fs (sda1): Unrecognized mount option "debug_want_ext"a_isize=0x0000000000000e22" or missing value 03:35:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff0}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:49 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_ext%a_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}, 0x50000000}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:49 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000feffffffc00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:49 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000076000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}, 0x8dffffff}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffffff000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1950.543948] EXT4-fs (sda1): Unrecognized mount option "debug_want_ext%a_isize=0x0000000000000e22" or missing value [ 1950.663560] EXT4-fs (sda1): Unrecognized mount option "debug_want_ext%a_isize=0x0000000000000e22" or missing value 03:35:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x48, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x4}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x2, 0x0, @rand_addr="04d80adce20f9259329568b6080100ec"}, {0x2, 0x0, 0xfffffffffffffffd, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0xfd000000]}}, r1}}, 0x48) 03:35:50 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000630195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}, 0xa00e0000}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:50 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000007180000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:50 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_ext,a_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}, 0xb00f0000}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) [ 1951.514211] EXT4-fs (sda1): Unrecognized mount option "debug_want_ext" or missing value 03:35:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:50 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000020000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:50 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000096000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1951.649849] EXT4-fs (sda1): Unrecognized mount option "debug_want_ext" or missing value 03:35:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r4, 0x200004) sendfile(r2, r4, 0x0, 0x80001d00c0d0) 03:35:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ff7f00000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:50 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000030000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}, 0xf0ffffff}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:50 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extr\n_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) [ 1951.947472] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr [ 1951.947472] _isize=0x0000000000000e22" or missing value 03:35:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff7f0000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}, 0xffffff8d}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:50 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000040000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1951.995932] audit: type=1800 audit(2000000150.700:438): pid=30418 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=16721 res=0 03:35:50 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000070f0000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:50 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000050000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1952.122950] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr [ 1952.122950] _isize=0x0000000000000e22" or missing value 03:35:50 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000240)='h', 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000740)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/161, 0xa1}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000a80)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000bc0)=""/204, 0xcc}], 0x7}, 0xfffffffe}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xda}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f00000009c0)=""/146, 0x92}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/167, 0xa7}, {&(0x7f0000000900)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/12, 0xc}}], 0xa, 0x0, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r5, &(0x7f00000008c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000700)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="c00000005e1b5f5ff59cfb079e0000000000000020e1a226071f4bad5e427bfee7f63a20b0", @ANYRES16=r6, @ANYBLOB="000229bd7000fedbdf25050000001400070008000200010000000800020002000000400006000400020004000200080001008100000008000100ffffff7f08000100ffffffff0400020008000100000000ff00010008000000080001000100000058000500080001006574680014000200080001000b00000008000200010400001c000200080002009a00000008000200000200000800010017000000080001006962000008000100657468000c0002000800040007000000"], 0xc0}, 0x1, 0x0, 0x0, 0x20044808}, 0x40000001) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000180)=0x9, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) close(r1) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xa5776b) r10 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r10, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) connect$inet(r10, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r12 = ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) r13 = ioctl$KVM_CREATE_VCPU(r12, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r13, 0xc008ae88, &(0x7f0000000240)={0x1, 0x0, [{0xc0000103}]}) r14 = socket$alg(0x26, 0x5, 0x0) bind$alg(r14, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r14, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r15 = accept$alg(r14, 0x0, 0x0) dup(r15) 03:35:51 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extr\"_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:51 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000060000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}, 0xfffffff0}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:51 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000010100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1952.462745] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr"_isize=0x0000000000000e22" or missing value 03:35:51 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000070000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) [ 1952.587207] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr"_isize=0x0000000000000e22" or missing value 03:35:51 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extr%_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:51 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000080000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x66efff7f00000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:51 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000020100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1952.887272] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr%_isize=0x0000000000000e22" or missing value 03:35:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x700f000000000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x2, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:51 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000090000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:51 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000030100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:51 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x4, 0x48000) connect$pptp(r0, &(0x7f0000000280)={0x18, 0x2, {0x0, @empty}}, 0x1e) syz_mount_image$xfs(&(0x7f0000000200)='xfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@wsync='wsync'}]}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200, 0x0) setxattr$security_capability(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f0000000180)=@v1={0x1000000, [{0x1, 0x1f}]}, 0xc, 0x2) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f0000000040)={0x2, 0x0, [], {0xc0d8a0bf0fed8105, @reserved}}) 03:35:51 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extr,_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x4, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:52 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000000a0000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:52 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x8002000000000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:52 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra\nisize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0xf, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) [ 1953.473806] XFS (loop2): Invalid superblock magic number 03:35:52 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000000b0000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x8003002000000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:52 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/24, @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/37], @ANYBLOB="0503080000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/15], @ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="3dc63840948fcc4b9cf16793ea67de4fda36e67d22d9542bdb574542a9d783c1d9dd15a47b2114ce9dc94c2f7219e1802681172fa09a9b2a507de6a3440d9ba6f7cbfa6ccb1ad1"], @ANYBLOB='C\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB], @ANYBLOB="c600000000000000", @ANYPTR=&(0x7f0000000640)=ANY=[@ANYBLOB], @ANYBLOB="0f00000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB], @ANYBLOB="ffff070000000000", @ANYPTR, @ANYBLOB='*\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'/55], @ANYBLOB='M\x00\x00\x00\x00\x00\x00', @ANYBLOB, @ANYBLOB], @ANYBLOB="070000000000000000000000000000000000000b1fd644b6"], 0x48}, 0x0) 03:35:52 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000020040100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x10, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:52 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000000e0000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:52 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra\"isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:52 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x20000000000000a, 0x2, 0x0) connect$inet6(r0, &(0x7f000004bfe4)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) getsockopt$sock_buf(r0, 0x1, 0x19, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x170) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) wait4(r1, 0x0, 0x40000000, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r2 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xfffffee1}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0xf2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f0000000280)=@sack_info={r8, 0x0, 0x3ff}, 0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f0000000180)={r8, 0x7}, &(0x7f0000000200)=0x8) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x2, 0x8400) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) ioperm(0x5, 0x9, 0x400) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) restart_syscall() r9 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x103001, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r9, 0x84, 0x18, &(0x7f0000000140)={0x0, 0x1}, 0x8) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000280)={0x6, "443586776df3cf20b82b861b00de13d1977a26214d2265e4401ef7ac417ab185"}) 03:35:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x50, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:52 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000100000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:52 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000050100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x110, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:52 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000110000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:53 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000060100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:53 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra,isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000000000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:53 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000170000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x240, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:53 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = socket(0xa, 0x6, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x203, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0xf9224100, 0x0, 0x0, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xfffffee1}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0xf2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000000)={0xfffffffa, 0xb, 0x1}) ioctl$GIO_SCRNMAP(r5, 0x4b40, &(0x7f0000000100)=""/207) 03:35:53 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000080080100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff00000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0xea0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:53 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000230000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:53 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_\nsize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:53 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000600000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1955.112097] audit: type=1400 audit(2000000153.810:439): avc: denied { sys_admin } for pid=30732 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 03:35:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0xf00, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1955.153618] IPVS: ftp: loaded support on port[0] = 21 03:35:53 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000fc0000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1955.230826] EXT4-fs: 10 callbacks suppressed [ 1955.230837] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ [ 1955.230837] size=0x0000000000000e22" or missing value 03:35:54 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000011b0100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:54 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000300c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1955.574705] IPVS: ftp: loaded support on port[0] = 21 03:35:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0xfb0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:54 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_\"size', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:54 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000500c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:54 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000006b6b6b0100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:54 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000800)='X', 0x1, r4) keyctl$clear(0x7, r4) add_key(&(0x7f00000008c0)='encrypted\x00', &(0x7f0000000900)={'syz', 0x2}, &(0x7f0000000940)="1e86a0172a5113119ee2fd5ac2ff040448923dc72e5b", 0x16, r4) keyctl$revoke(0x3, r4) r5 = accept$alg(r3, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xfffffee1}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0xf2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) write$rfkill(r6, &(0x7f0000000040)={0x28, 0x0, 0x2}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000540)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58034347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00"/130, 0x82, 0x1, 0x0, 0x4f5) sendto$inet(r0, &(0x7f0000000600)="de", 0x1, 0x404c0d1, 0x0, 0x0) 03:35:54 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000600c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1955.820930] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_"size=0x0000000000000e22" or missing value 03:35:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x1001, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:54 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000004800100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:54 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000700c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1955.975672] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_"size=0x0000000000000e22" or missing value [ 1956.014578] encrypted_key: insufficient parameters specified 03:35:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x4002, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:54 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_%size', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:54 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000900c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:55 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f00000001c0)=0x4, 0x4) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev, @in6=@mcast1}, {@in6=@mcast2, 0x0, 0x32}, @in=@local, {}, {}, {}, 0x0, 0x0, 0xa, 0x1}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x0, 0x60}}]}, 0x13c}}, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x80000) mq_timedreceive(r4, &(0x7f00000009c0)=""/234, 0xea, 0x5, &(0x7f00000008c0)) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r2, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0x435}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xfffffee1}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0xf2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000180)=0xffffffffffffffff, 0x4) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r7 = accept$alg(r1, 0x0, 0x0) r8 = dup(r7) r9 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/checkreqprot\x00', 0x800, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r9, 0x400448c9, &(0x7f0000000700)={{0x2, 0x2, 0x14, 0x3f, 0x4, 0x8}, 0x5}) write$UHID_DESTROY(r8, &(0x7f0000000080), 0xfff2) recvmmsg(r8, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000900)=""/50, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f000000a0c0)=""/4106, 0x100a}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xda}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0xfffffffffffffff8}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) ioctl$GIO_UNIMAP(r8, 0x4b66, &(0x7f0000000080)={0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}]}) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="3c010000100013070000000000000000fe800000000000000000000000000000ff01000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff0200000000000000000000000000010000000032000000ac1414aa0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00010000000000000000004c001200726663343130362867636d286165732929000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000"], 0x13c}}, 0x0) setsockopt$SO_TIMESTAMPING(r10, 0x1, 0x41, &(0x7f0000000380)=0x828, 0x4) r11 = fcntl$dupfd(r0, 0x0, r0) write$selinux_attr(r11, &(0x7f00000000c0)='system_u:object_r:cron_spool_t:s0\x00', 0x19f) 03:35:55 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000fffffdef0100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x5000, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:55 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000a00c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1956.467578] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_%size=0x0000000000000e22" or missing value [ 1956.519492] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0xa00e, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) [ 1956.636794] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1956.676592] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_%size=0x0000000000000e22" or missing value 03:35:55 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000fffffffe0100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:55 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000b00c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:55 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x40280, 0x0) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000080)) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f00000000c0)={0x12000000, {{0x2, 0x4e21, @loopback}}, 0x1, 0x3, [{{0x2, 0x4e24, @remote}}, {{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e24, @rand_addr=0x5}}]}, 0x210) setsockopt(r0, 0x0, 0x803f, &(0x7f0000000000)="41c986a67fdafa23b87edef9e74773f7a703102c", 0x14) 03:35:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0xb00f, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:55 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_,size', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:55 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000e00c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:55 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000effdffff0100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:55 executing program 2: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) dup(r2) read$alg(r2, &(0x7f00000003c0)=""/251, 0x10000023e) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2, 0x12, r0, 0x2c) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x1d553b80ae321cd2, 0x0) ioctl$int_in(r3, 0x800000c004500a, &(0x7f0000000040)) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f00000000c0)={0x10}) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000280)={0x7, 0x8}, 0x20000290) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0xa}}, 0x20) 03:35:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x40000, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) [ 1957.104660] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_" or missing value 03:35:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:55 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000001100c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8005}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0xc502, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="280000002200290800000000000000000400fb28b7b957ddb18962acd66ae9aaab000014000000fe"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) r1 = socket$inet6(0xa, 0x5, 0x0) socket$inet6(0xa, 0x2, 0x4) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xfffffee1}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0xf2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) setsockopt$inet_int(r1, 0x0, 0xf, 0x0, 0x0) [ 1957.285443] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_" or missing value 03:35:56 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000feffffff0100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x100000, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) [ 1957.407345] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:56 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_i\nize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:56 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000001700c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x280}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x2000000, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:56 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000001f00c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1957.754962] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i [ 1957.754962] ize=0x0000000000000e22" or missing value 03:35:56 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000001fffffff01000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0xf000000, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:56 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000002300c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1958.243724] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1958.253993] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i [ 1958.253993] ize=0x0000000000000e22" or missing value 03:35:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x10010000, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:57 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000200000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf70}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:57 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_i\"ize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:57 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000003f00c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:57 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="67d3"], 0x2) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffe}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xfffffee1}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0xf2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) ioctl$NS_GET_OWNER_UID(r3, 0xb704, &(0x7f0000000100)=0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev, @in6=@mcast1}, {@in6=@mcast2, 0x0, 0x32}, @in=@local, {}, {}, {}, 0x0, 0x0, 0xa, 0x1}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x0, 0x60}}]}, 0x13c}}, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000200)=0xc) r7 = geteuid() r8 = geteuid() lstat(&(0x7f0000000380)='./control\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000280)='./control\x00', 0x0, r9) lstat(&(0x7f0000000380)='./control\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000280)='./control\x00', 0x0, r10) lsetxattr$system_posix_acl(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000240)={{}, {0x1, 0x4}, [{0x2, 0x4, r4}, {0x2, 0x2, r6}, {0x2, 0x1, r7}, {0x2, 0x0, r8}], {0x4, 0x1}, [{0x8, 0x3, r9}, {0x8, 0x4, r10}], {0x10, 0x4}, {0x20, 0x1}}, 0x54, 0x5) 03:35:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x40020000, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:57 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000004000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:57 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000300000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1958.725245] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i"ize=0x0000000000000e22" or missing value 03:35:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700f}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x50000000, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:57 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000006000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:57 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) ioctl$NBD_SET_BLKSIZE(r3, 0xab01, 0x81) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0), 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xfffffffffffffff9}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xda}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0xff4b}, 0x909}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x2a, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) ioctl$IMDELTIMER(r3, 0x80044941, &(0x7f0000000000)) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xfffffee1}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0xf2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r6, 0xc0505405, &(0x7f0000000180)={{0x1, 0x1, 0x6, 0x2, 0x1ff}, 0xfffffffffffffff7, 0x200, 0x2}) 03:35:57 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_i#ize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:57 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000fe8000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x8dffffff, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:57 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000400000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:57 executing program 2: r0 = creat(&(0x7f0000000540)='./bus\x00', 0x0) lseek(r0, 0x1f, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x0) fallocate(r0, 0x3, 0x0, 0x8020001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RSTAT(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="710000007d000000006a00000005000000000000000000000000000000000000000000000000090000000000000000000000080074727573746564000000110028706f7369785f61636c5f6163636573731e0070726f6375736572497fae9108ff31846f6465762e76626f786e6574307d"], 0x71) lseek(r0, 0x0, 0x3) 03:35:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8002}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:58 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000fec000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0xa00e0000, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:58 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_i%ize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:58 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000500000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0xb00f0000, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:58 executing program 2: openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f00000000c0)='vfat\x00', 0x5, 0x1) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781d1d3abf9d1a51c4bfce1e77551a8bd678625f508300200000040847bc2fdffe8cd918b0350412915d8a5c51817c3ff01a1f62ac71e85445d8f244f6be479ffffffffff8756ea7d486588272169d8b90f1d7106f5776f7894ee47382b88117e33f06e3203053a6a05995f5ed199fcf8722be75fa42c080601d48e7001161161a2793d1429196b4d9182f7c46359a074285b251aca195af3b2887cc79d0cedcc0b7e7f95c7d70472f7d3981e50042390a546375c8c1f1734a24583e1f8066319e93802eda50f3fb22ab8d6dc3d2afd102b71"], 0xe4) r2 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x5, 0x0) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000240)={0x2d, 0x12, 0x15, 0xe, 0x3, 0x40, 0x2, 0x16b}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0385720, &(0x7f0000000100)={0x1, {0x77359400}, 0xfffffff7, 0x1}) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 03:35:58 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000000fc00c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:58 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_i*ize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0xf0ffffff, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:58 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000080fe00c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:58 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000600000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:58 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000c0fe00c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0xffffff8d, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:59 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_i+ize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:59 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000000ff00c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1960.520459] EXT4-fs: 7 callbacks suppressed [ 1960.520476] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i+ize=0x0000000000000e22" or missing value 03:35:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) mincore(&(0x7f0000000000/0x400000)=nil, 0x400091, &(0x7f0000000140)=""/177) 03:35:59 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000001b01000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0xfffffff0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ff7f}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:59 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000200c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1960.767976] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i+ize=0x0000000000000e22" or missing value 03:35:59 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000300c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xf}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:35:59 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_i,ize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:35:59 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000003000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:35:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:35:59 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000400c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:35:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) mincore(&(0x7f0000000000/0x400000)=nil, 0x400091, &(0x7f0000000140)=""/177) 03:35:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0x10}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) [ 1961.212844] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i" or missing value 03:36:00 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000008004000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0x200012fc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:00 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000500c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1961.378580] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i" or missing value 03:36:00 executing program 2: syz_open_dev$admmidi(0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) clock_nanosleep(0xb, 0x0, &(0x7f0000000040)={0x0, 0x989680}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000004cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:36:00 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_i-ize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0x7ffff000}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:00 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000600c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:00 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000005000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1961.810925] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i-ize=0x0000000000000e22" or missing value 03:36:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xffffffffffffffff}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:00 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000700c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xfffffee1}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0xf2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) ioctl$PPPIOCGUNIT(r3, 0x80047456, &(0x7f0000000000)) prctl$PR_SET_THP_DISABLE(0x29, 0x1) syz_open_procfs(0x0, &(0x7f0000272000)) 03:36:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66efff7f}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1962.016076] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i-ize=0x0000000000000e22" or missing value 03:36:00 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000006000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:00 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000800c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:00 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_i.ize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:00 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x6) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x80000, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)={0x57, 0x6f, 0x1, {0x6, [{0x40, 0x3, 0x7}, {0x10, 0x4, 0x3}, {0x0, 0x2}, {0x0, 0x4, 0x4}, {0x1, 0x3, 0x2}, {0x6f16a58582b56070, 0x0, 0x4}]}}, 0x57) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r2, &(0x7f0000005700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, 0x0) sendmmsg(r2, &(0x7f000000a080)=[{{0x0, 0x0, &(0x7f0000005640)=[{&(0x7f0000001900)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x300, 0x0) 03:36:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x4}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700f0000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1962.286062] audit: type=1400 audit(2000000160.990:440): avc: denied { name_bind } for pid=31334 comm="syz-executor.2" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 03:36:01 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00000000011b000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:01 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000900c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1962.402403] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i.ize=0x0000000000000e22" or missing value [ 1962.411069] audit: type=1400 audit(2000000160.990:441): avc: denied { node_bind } for pid=31334 comm="syz-executor.2" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 03:36:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0xf}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:01 executing program 2: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="40000000000025000400000005009c00000000000000280000000000"], 0x1c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x40, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000180)={0xb5c, 0xc73c, 0xe6, 0x3}) r2 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r2, 0x0, 0x11, &(0x7f0000000040)) semctl$IPC_RMID(r2, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) semtimedop(r2, &(0x7f00000001c0)=[{0x25aabc9e0c850eed, 0x65a, 0x1800}, {0x2, 0x1ff, 0x800}], 0x2, &(0x7f0000000240)={r3, r4+30000000}) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000280)={0x7fffffff, 0xffffff81, 0x100, 0x2, 0x1, 0x9, 0x7, 0x4, 0xfffffff7, 0x4, 0x101, 0x8}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f000002eff0)={0x32b, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x40, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 03:36:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffef66}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1962.588940] audit: type=1400 audit(2000000161.000:442): avc: denied { name_connect } for pid=31334 comm="syz-executor.2" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 03:36:01 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000a00c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1962.657815] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i.ize=0x0000000000000e22" or missing value 03:36:01 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000480000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:01 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_i0ize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x2000a05c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffff000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:01 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000b00c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:01 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00000000fdef000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x7fffef44}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) [ 1963.070937] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i0ize=0x0000000000000e22" or missing value 03:36:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80020000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:01 executing program 2: open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r1, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$EVIOCGABS2F(r2, 0x8018456f, &(0x7f0000000440)=""/51) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000000)=0x8, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x8e001) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80001d00c0d0) ioctl$BLKROGET(r3, 0x125e, &(0x7f00000001c0)) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x40840, 0x0) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x190, 0x0, 0x200, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffe}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1f}]}, @TIPC_NLA_NODE={0x34, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_MEDIA={0x10, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}]}]}, @TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x800}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_BEARER={0x64, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x7, @mcast2, 0x1}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x3, @remote, 0x81}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x29}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffbff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x40}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1ff}]}]}, 0x190}, 0x1, 0x0, 0x0, 0x4000}, 0x4080010) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0x100, 0x0) r6 = mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r2, 0x0) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f0000000840)={0xb8, 0x0, &(0x7f0000000700)=[@free_buffer={0x40086303, r6}, @reply={0x40406301, {0x3, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x60, 0x18, &(0x7f0000000540)={@fda={0x66646185, 0x6, 0x1, 0x10}, @flat=@handle={0x73682a85, 0x2002, 0x1}, @ptr={0x70742a85, 0x1, &(0x7f00000004c0)=""/107, 0x6b, 0x2, 0x40}}, &(0x7f00000005c0)={0x0, 0x20, 0x38}}}, @transaction={0x40406300, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000640)={@ptr={0x70742a85, 0x1, &(0x7f0000000600)=""/9, 0x9, 0x0, 0x4}, @flat=@weak_handle={0x77682a85, 0x5, 0x1}, @flat=@binder={0x73622a85, 0x100, 0x1}}, &(0x7f00000006c0)={0x0, 0x28, 0x40}}}, @increfs_done={0x40106308, 0x2}, @release={0x40046306, 0x1}, @acquire={0x40046305, 0x1}], 0x41, 0x0, &(0x7f00000007c0)="ad6c9fd52963c5f7a4a7404c57e35c17e1c3061ce18e51bc4d34b8f548094fcbc151b2df608341654eaef1e018d18cb1c490eebfb7a61403a051b91f8614906e4f"}) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:36:01 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000e00c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1963.175856] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i0ize=0x0000000000000e22" or missing value 03:36:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x3, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:02 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00000000effd000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:02 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_iXize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80030020}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:02 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000001000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x5, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1963.520263] audit: type=1400 audit(2000000162.230:443): avc: denied { map } for pid=31423 comm="syz-executor.2" path="/selinux/commit_pending_bools" dev="selinuxfs" ino=11 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=file permissive=1 03:36:02 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000001100c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:02 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x8, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:02 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_icize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90000000}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:02 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000001700c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:02 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000300000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x1, 0x0) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000180)={0x49, 0x29, 0x1, {0xfff, [{{0x48, 0x1, 0x3}, 0x100, 0x0, 0x7, './file0'}, {{0x0, 0x2, 0x5}, 0xfff, 0x0, 0x7, './file0'}]}}, 0x49) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000080)={0x10200, 0x0, &(0x7f0000fff000/0x1000)=nil}) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f0000000040)={0x18000001, 0x2000000}) 03:36:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x10, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:03 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000002300c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0xf00, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:03 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000400000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1964.368938] audit: type=1400 audit(2000000163.070:444): avc: denied { getattr } for pid=31502 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1964.402838] [drm:drm_wait_vblank_ioctl] *ERROR* Unsupported type value 0x18000001, supported mask 0x7400003f 03:36:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:03 executing program 2: socket$inet_smc(0x2b, 0x1, 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) syz_open_procfs(r1, &(0x7f0000000080)='net/l2cap\x00') ptrace$cont(0x9, r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000000)) connect$rxrpc(r2, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) recvmmsg(r2, &(0x7f0000001f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 03:36:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:03 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000006000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:03 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_idize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:03 executing program 2: getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f0000000000)=""/181, &(0x7f00000000c0)=0xb5) ioctl$VIDIOC_SUBDEV_G_SELECTION(0xffffffffffffffff, 0xc040563d, &(0x7f0000000100)={0x1, 0x0, 0x0, 0x4, {0x200, 0x5efd, 0x8, 0x8}}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x395203, 0x0) faccessat(r0, &(0x7f0000000180)='./file0\x00', 0x80, 0x800) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f00000001c0)) fstat(r0, &(0x7f0000000200)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x400000, 0x0) r2 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/attr/current\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000300)={0x3c85053d580ed735}) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000340)={0x0, r2, 0x1, 0x6, 0x8, 0xff}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380)="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", 0x1000) r3 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) sendmsg$nl_route(r3, &(0x7f0000001440)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x220021}, 0xc, &(0x7f0000001400)={&(0x7f00000013c0)=@ipv6_getanyicast={0x14, 0x3e, 0x200, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20}, 0x80) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000014c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000001480)='/proc/self/attr/current\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001500)={r4}, 0xc) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000001540)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000001580)='trusted.overlay.nlink\x00', &(0x7f00000015c0)={'U+', 0x1}, 0x28, 0x2) r5 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) ioctl$KVM_DIRTY_TLB(r5, 0x4010aeaa, &(0x7f0000001600)={0xffffffff, 0x800}) openat$cgroup_ro(r3, &(0x7f0000001640)='cpuset.effective_mems\x00', 0x0, 0x0) r6 = syz_open_dev$cec(&(0x7f0000001680)='/dev/cec#\x00', 0x1, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001700)={0x0}, &(0x7f0000001740)=0xc) sendmsg$nl_netfilter(r6, &(0x7f00000028c0)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x1050008}, 0xc, &(0x7f0000002880)={&(0x7f0000001780)={0x10c4, 0x3, 0xb, 0x300, 0x70bd29, 0x25dfdbfc, {0x0, 0x0, 0x7}, [@generic="a7e178ae1d1e51eae01482aa1bf38470b5590185754b114aa0b4f2ddb695c7058f37ac4f3b54dd8fb63cba86c642eef4533e32", @typed={0xc, 0x11, @binary="2a369b6eb4e2"}, @typed={0x8, 0x66, @pid=r7}, @nested={0x68, 0x55, [@generic="a9ce1e305e24aa6343f5", @generic="94d2c07b3800a6809d5fde9442e5605e9c16107ed98019d8dc603b723126a0e2f5ccda005bfc8c3b5da75dc022dc2adbac04a27c23497e0053effc284b24894a6b10c1561f6724a9586bd2e55e49665403a3ecc1a63683da27"]}, @generic="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"]}, 0x10c4}, 0x1, 0x0, 0x0, 0x4000}, 0x48000) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f0000002900)) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000002940)='/dev/net/tun\x00', 0x127003, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r8, 0x40086607, &(0x7f0000002980)=0x3) r9 = syz_open_dev$midi(&(0x7f00000029c0)='/dev/midi#\x00', 0x10000, 0x0) ioctl$BINDER_THREAD_EXIT(r9, 0x40046208, 0x0) r10 = syz_open_dev$dspn(&(0x7f0000002a00)='/dev/dsp#\x00', 0x1, 0x8578e055cdd91ad7) r11 = syz_genetlink_get_family_id$nbd(&(0x7f0000002a80)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r10, &(0x7f0000002b40)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000002b00)={&(0x7f0000002ac0)={0x20, r11, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) 03:36:03 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000500000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:03 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000000fc00c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff0}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69, 0x2}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:03 executing program 2: ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xfffffee1}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0xf2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) connect$rose(r2, &(0x7f0000000000)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, 0x1, @default}, 0x1c) syz_open_procfs(0x0, 0x0) write$tun(0xffffffffffffffff, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, 0x0) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000080)='.\x00', 0xfe) r4 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r4, &(0x7f0000000380)=ANY=[@ANYBLOB="674466980000000000000000000000006517a42ac4cb7a63d1a97a7e5a31524e892eac4023b714a3072f99f16d06589e03469637a7267592938766010a35efd21affe2009e107e7ce4fc59489d665e4178e696fdc31a381587a5960ac2022d45136803a9e841e84f03d05ebc7e87c10dfc8b2cf1"], 0x74) sendfile(r4, r4, &(0x7f0000000200), 0xa198) ioctl$sock_x25_SIOCDELRT(r4, 0x890c, &(0x7f00000009c0)={@null=' \x00', 0x2, 'ip6_vti0\x00'}) 03:36:03 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000003c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:03 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_iiize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69, 0x4}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:03 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000600000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:04 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000005c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69, 0xf}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:04 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000006c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:04 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00000000ffffff1f00000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}, 0x2}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000100)={0xf, 0x416, 0x2, {0x9, @raw_data="bad2b27370b1aa830df1fcd577e6c8ca952ed51536091eeeb75d8720b1780d8af366e6fb17139f69828886e748dd702c8f6c64c72f09bad21b9f372fcc66882d4e4202dab8df41cb8c8ad717c4dcc9b58330f0c4635bafead65fce534aa979f2af6535a2ed97873f39c406620ef09aff4f5596d0ab2b38fbecc3084710948470f21f2714c9ee023745e18991a5024bfbbceba648b42bf08689a1e782ad5ac853631b3ae265e947cf7141dc84335f2df4f1079618d9dccf3bbee6a8ac04f6559d760355578d53508e"}}) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='illinois\x00', 0x9) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) 03:36:04 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_ilize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69, 0x10}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:04 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000007c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:04 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000012323a00000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1965.770382] EXT4-fs: 8 callbacks suppressed [ 1965.770405] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ilize=0x0000000000000e22" or missing value 03:36:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}, 0x4}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69, 0x50}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:04 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000009c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1965.889452] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ilize=0x0000000000000e22" or missing value 03:36:04 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xfffffee1}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0xf2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000080)=0x7, 0x4) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000240)={0x53, 0xfffffffffffffffe, 0xfffffffffffffdf6, 0x0, @scatter={0x0, 0x0, &(0x7f00000022c0)=[{&(0x7f0000000080)}, {&(0x7f00000002c0)=""/4096}, {&(0x7f0000002340)=""/4096}, {&(0x7f00000000c0)=""/199}, {&(0x7f00000001c0)=""/56}]}, &(0x7f0000000040)="9b247f1c1793", 0x0, 0x1, 0x10, 0xffffffff, 0x0}) write(r0, &(0x7f00000012c0)="4791b67e5245efc46d8069f3473b29a451e4a0f3c4312695da321154ebb02438b1036c4d18fd1b4f67dc08407e089d75db5e9e74523896836ef5099e608396beaf07867d1004f4ed01f24e51dd68ceed4e2751833d6407fe185d33da771733bd0df529d083f2eb79138380a13a05e13fe0fc23a4a05d80cddcda89e37da6e020b9ff1c249ed23af0ab6edeffe80abc4b66f38784de1959addd3dc54c257e1b762d9afe0d91097fbee171acb2654c66b43e6857429106f6ede26d76f9c2896593f0f6c42da747ed893d02beef791bfdba9b935df8a40088a20d749c9c25a1fbbeda191d2d738833ccdb38cd", 0xeb) 03:36:04 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000000000ac00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69, 0x110}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:04 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_ioize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) [ 1966.140856] sd 0:0:1:0: [sg0] tag#336 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 1966.149640] sd 0:0:1:0: [sg0] tag#336 CDB: opcode=0x9b [ 1966.154995] sd 0:0:1:0: [sg0] tag#336 CDB[00]: 9b 24 7f 1c 17 93 03 b4 f0 a1 25 85 67 5d 26 b0 [ 1966.164023] sd 0:0:1:0: [sg0] tag#336 CDB[10]: d5 e3 83 e5 b3 b6 0c ed 5c 54 db b7 29 5d f0 df [ 1966.173104] sd 0:0:1:0: [sg0] tag#336 CDB[20]: 82 17 ad 62 00 51 27 00 00 00 00 00 00 e6 00 00 [ 1966.182012] sd 0:0:1:0: [sg0] tag#336 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1966.190965] sd 0:0:1:0: [sg0] tag#336 CDB[40]: 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1966.199924] sd 0:0:1:0: [sg0] tag#336 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1966.208733] sd 0:0:1:0: [sg0] tag#336 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1966.217612] sd 0:0:1:0: [sg0] tag#336 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1966.226472] sd 0:0:1:0: [sg0] tag#336 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03:36:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}, 0xf}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:05 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000000000bc00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1966.235351] sd 0:0:1:0: [sg0] tag#336 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1966.244207] sd 0:0:1:0: [sg0] tag#336 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1966.253086] sd 0:0:1:0: [sg0] tag#336 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1966.261960] sd 0:0:1:0: [sg0] tag#336 CDB[c0]: 26 00 73 6b 63 69 70 68 65 72 00 00 00 00 00 00 [ 1966.270851] sd 0:0:1:0: [sg0] tag#336 CDB[d0]: 00 00 00 00 00 00 00 00 6c 72 77 28 61 65 73 29 [ 1966.279715] sd 0:0:1:0: [sg0] tag#336 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03:36:05 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69, 0x240}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) [ 1966.288539] sd 0:0:1:0: [sg0] tag#336 CDB[f0]: 00 00 00 00 00 00 [ 1966.331413] sd 0:0:1:0: [sg0] tag#336 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 1966.340289] sd 0:0:1:0: [sg0] tag#336 CDB: opcode=0x9b [ 1966.345637] sd 0:0:1:0: [sg0] tag#336 CDB[00]: 9b 24 7f 1c 17 93 03 b4 f0 a1 25 85 67 5d 26 b0 [ 1966.354711] sd 0:0:1:0: [sg0] tag#336 CDB[10]: d5 e3 83 e5 b3 b6 0c ed 5c 54 db b7 29 5d f0 df [ 1966.363651] sd 0:0:1:0: [sg0] tag#336 CDB[20]: 82 17 ad 62 00 51 27 00 00 00 00 00 00 e6 00 00 [ 1966.372530] sd 0:0:1:0: [sg0] tag#336 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03:36:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69, 0xea0}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) [ 1966.381413] sd 0:0:1:0: [sg0] tag#336 CDB[40]: 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1966.390283] sd 0:0:1:0: [sg0] tag#336 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1966.399236] sd 0:0:1:0: [sg0] tag#336 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1966.408047] sd 0:0:1:0: [sg0] tag#336 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1966.416948] sd 0:0:1:0: [sg0] tag#336 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03:36:05 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000000000ec00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1966.425814] sd 0:0:1:0: [sg0] tag#336 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1966.434678] sd 0:0:1:0: [sg0] tag#336 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1966.443573] sd 0:0:1:0: [sg0] tag#336 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1966.452439] sd 0:0:1:0: [sg0] tag#336 CDB[c0]: 26 00 73 6b 63 69 70 68 65 72 00 00 00 00 00 00 [ 1966.461302] sd 0:0:1:0: [sg0] tag#336 CDB[d0]: 00 00 00 00 00 00 00 00 6c 72 77 28 61 65 73 29 [ 1966.470176] sd 0:0:1:0: [sg0] tag#336 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1966.478989] sd 0:0:1:0: [sg0] tag#336 CDB[f0]: 00 00 00 00 00 00 03:36:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}, 0x10}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1966.558985] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ioize=0x0000000000000e22" or missing value 03:36:05 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000e80f0000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:05 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000011c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69, 0xf00}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:05 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x800, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000180)=0x41a, 0x4) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x100, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000b40)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xda}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000000a80)=""/147, 0x93}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) ioctl$RTC_VL_READ(r4, 0x80047013, &(0x7f0000000080)) [ 1966.726642] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ioize=0x0000000000000e22" or missing value 03:36:05 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_ipize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:05 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000017c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69, 0xfb0}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:05 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000002000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}, 0x90}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:05 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000000001fc00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1967.116717] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ipize=0x0000000000000e22" or missing value 03:36:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69, 0x1001}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:05 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000003000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:06 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000023c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1967.294448] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ipize=0x0000000000000e22" or missing value 03:36:06 executing program 2: r0 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0x3, 0x300) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000280)=@sack_info={r3, 0x0, 0x3ff}, 0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x31b, 0x18004, 0x6, 0x3, r3}, &(0x7f0000000040)=0x10) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x111800, 0x0) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/checkreqprot\x00', 0xa0000, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r8 = accept$alg(r7, 0x0, 0x0) r9 = dup(r8) write$UHID_DESTROY(r9, &(0x7f0000000080), 0xfff2) recvmmsg(r9, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x7a, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0xffffffffffffff23, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/19, 0x13}], 0x2, &(0x7f00000008c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x20, 0x0) r10 = socket$inet6_sctp(0xa, 0x5, 0x84) r11 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r11, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r11, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r10, 0x84, 0x10, &(0x7f0000000280)=@sack_info={r12, 0x0, 0x3ff}, 0xc) getsockopt$inet_sctp6_SCTP_STATUS(r9, 0x84, 0xe, &(0x7f00000002c0)={r12, 0x0, 0x5, 0xf6, 0x0, 0x7ff, 0x0, 0x5, {r4, @in6={{0xa, 0x4e23, 0x0, @loopback, 0x7}}, 0x7215, 0x3, 0x8, 0xffffff81, 0x3}}, &(0x7f0000000380)=0xb0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f00000003c0)=@sack_info={r13, 0x9, 0x2}, &(0x7f0000000400)=0xc) r14 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r14, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev, @in6=@mcast1}, {@in6=@mcast2, 0x0, 0x32}, @in=@local, {}, {}, {}, 0x0, 0x0, 0xa, 0x1}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x0, 0x60}}]}, 0x13c}}, 0x0) r15 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r15, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev, @in6=@mcast1}, {@in6=@mcast2, 0x0, 0x32}, @in=@local, {}, {}, {}, 0x0, 0x0, 0xa, 0x1}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x0, 0x60}}]}, 0x13c}}, 0x0) sendfile(r14, r15, &(0x7f0000000540), 0x9) write$FUSE_DIRENT(r5, &(0x7f0000000200)={0x28, 0x0, 0x2, [{0x4, 0xffffffff00000001}]}, 0x28) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000080)={r4, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x84) 03:36:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}, 0x280}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69, 0x4002}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:06 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_iuize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:06 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000000003fc00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:06 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000004000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1967.659221] protocol 88fb is buggy, dev hsr_slave_0 [ 1967.664470] protocol 88fb is buggy, dev hsr_slave_1 [ 1967.669664] protocol 88fb is buggy, dev hsr_slave_0 [ 1967.674736] protocol 88fb is buggy, dev hsr_slave_1 [ 1967.679892] protocol 88fb is buggy, dev hsr_slave_0 [ 1967.684959] protocol 88fb is buggy, dev hsr_slave_1 [ 1967.688967] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iuize=0x0000000000000e22" or missing value 03:36:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69, 0x5000}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}, 0xf00}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:06 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000005000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1967.852900] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iuize=0x0000000000000e22" or missing value 03:36:06 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000040c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69, 0xa00e}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}, 0xf70}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69, 0xb00f}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:07 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_ixize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:07 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000006000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:07 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000060c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$RTC_WIE_ON(r0, 0x700f) r1 = socket(0xa, 0x2, 0x0) close(r1) r2 = socket$inet6(0xa, 0x100000000802, 0x0) setsockopt$inet6_buf(r2, 0x29, 0x39, &(0x7f0000000340)="ff020400"/24, 0x18) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="35d4a7cf18000000629841c900"}, 0x1c) sendmmsg$inet_sctp(r1, &(0x7f0000000100), 0xa0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = accept$alg(r3, 0x0, 0x0) r5 = dup(r4) write$UHID_DESTROY(r5, &(0x7f0000000080), 0xfff2) recvmmsg(r5, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xfffffee1}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0xf2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f00000000c0)={0x2, 0x2, 0x100, 0x9, 0x40}, 0x14) 03:36:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}, 0x700f}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}, 0x8002}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:07 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000000fe80c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1968.495791] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ixize=0x0000000000000e22" or missing value 03:36:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69, 0x40000}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:07 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00000000001b010100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1968.639032] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ixize=0x0000000000000e22" or missing value 03:36:07 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000000fec0c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:07 executing program 2: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r3 = fanotify_init(0x0, 0x0) fanotify_mark(r3, 0x2000000000000011, 0x2, r2, 0x0) pipe(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev, @in6=@mcast1}, {@in6=@mcast2, 0x0, 0x32}, @in=@local, {}, {}, {}, 0x0, 0x0, 0xa, 0x1}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x0, 0x60}}]}, 0x13c}}, 0x0) sendfile(r4, r5, 0xfffffffffffffffd, 0xffffffffffff8000) socket$inet6(0xa, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r0, r1, 0x0, 0x44ee) 03:36:07 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_is\nze', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}, 0x9000}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69, 0x100000}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) [ 1968.879598] audit: type=1800 audit(2000000167.590:445): pid=31909 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17334 res=0 03:36:07 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000030100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:07 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000000000fcc00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1968.928594] audit: type=1804 audit(2000000167.630:446): pid=31915 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir535699099/syzkaller.VkyetA/4895/file0" dev="sda1" ino=17334 res=1 03:36:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}, 0x40000}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69, 0x2000000}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) [ 1969.098220] audit: type=1804 audit(2000000167.630:447): pid=31909 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir535699099/syzkaller.VkyetA/4895/file0" dev="sda1" ino=17334 res=1 03:36:07 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000000080fec00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:07 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000080040100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:08 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_is\"ze', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}, 0x100000}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1969.647022] audit: type=1804 audit(2000000168.350:448): pid=31909 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir535699099/syzkaller.VkyetA/4895/file0" dev="sda1" ino=17334 res=1 03:36:08 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000000c0)=ANY=[], 0x0) 03:36:08 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000000c0fec00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69, 0xf000000}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}, 0xf0ff7f}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:08 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000050100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1969.683697] audit: type=1804 audit(2000000168.350:449): pid=31976 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir535699099/syzkaller.VkyetA/4895/file0" dev="sda1" ino=17334 res=1 03:36:08 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_is%ze', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:08 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000060100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:08 executing program 2: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_procfs(r0, &(0x7f00000002c0)='net/stat\x00') statx(r1, &(0x7f0000000440)='./file0\x00', 0x100, 0x20, &(0x7f0000000880)) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x8, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x2bf}}, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getgid() getgroups(0x1, &(0x7f00000001c0)=[0xffffffffffffffff]) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) getgroups(0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x3fc) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x20000, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r4, 0x40044900, 0x2) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000780)=0x14) setuid(0x0) getpeername(0xffffffffffffffff, &(0x7f0000000300)=@can={0x1d, 0x0}, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000380)={@loopback, @remote, @dev, 0x0, 0x4, 0x200, 0x400, 0x0, 0x0, r5}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x2, 0xc, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99}, [@alu={0x7, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffec, 0x10}, @initr0, @initr0={0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x5a32}, @jmp={0x5, 0x0, 0x4, 0x1, 0x0, 0xfffffffffffffff0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, @ldst={0x8a919c254653b418, 0x0, 0x1, 0x2, 0x19, 0xfffffffffffffff0, 0xffffffffffffffff}]}, 0x0, 0x4, 0xb9, &(0x7f0000000380)=""/185, 0x40f00, 0x8562149493411ab2, [], r5, 0x12, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x2, 0x9, 0x10000}, 0x10}, 0x70) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000640)=ANY=[@ANYBLOB="80100000100005070600"/20, @ANYRES32=r6, @ANYBLOB="000000000000000060001200080001007674690054000200080003000500000008000100", @ANYRES32, @ANYBLOB="08000300060700000800030000456eab9654005d5dd4000000080006000300000051188398ae08"], 0x5}}, 0x0) sendmsg$nl_xfrm(r4, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00), 0x1, 0x0, 0x0, 0x4000010}, 0x80000) 03:36:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}, 0x2000000}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69, 0x10010000}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:08 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000000000ffc00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:08 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000630195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:08 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000011b0100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69, 0x40020000}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}, 0xf000000}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:09 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_is,ze', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:09 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x8, 0x80000) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f00000000c0)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000002a80)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40000000000000, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x10001}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) getresgid(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) r2 = open(&(0x7f0000000100)='./file0\x00', 0x140, 0x0) fcntl$setlease(r2, 0x400, 0x1) ioctl$LOOP_SET_FD(r1, 0x1261, 0xffffffffffffffff) 03:36:09 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000002c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69, 0x50000000}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}, 0x20000380}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:09 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000004800100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69, 0x8dffffff}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:09 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000003c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}, 0x66efff7f}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:09 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isi\ne', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:09 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000004c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}, 0x700f0000}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1970.934612] EXT4-fs: 7 callbacks suppressed [ 1970.934625] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isi [ 1970.934625] e=0x0000000000000e22" or missing value [ 1971.062992] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isi [ 1971.062992] e=0x0000000000000e22" or missing value 03:36:09 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000005c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x2000, 0x0) ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r0, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x51, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0), 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xda}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000000a80)=""/178, 0xb2}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/20, 0x14}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x4) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x23c48488e30ab957) r6 = syz_open_dev$mice(&(0x7f0000000700)='/dev/input/mice\x00', 0x0, 0xb166c56755cc3281) ioctl$EVIOCGMASK(r6, 0x80104592, &(0x7f00000008c0)={0x5, 0xf9, &(0x7f0000000b40)="3ef0f66808addc53629076566abc826bc03864abafd1d89fa95e52cd8b9da68dcb0263c88b5c70b98b2da50bb388c3eeae8f2fc144b01218274e86962bd13ac2d73b0c9a18884f7743e0be34acb2c09394df368f4ac58ac00409a5cb9bfb991b54a56319129e0062d6b0967c972fdcf7703fc66e818fa7daa4997b6679cb65c891151d0beb6ca8049ffa186d2f8dc3ef60170a001ac4a454b6a9d177f6158e50cff73319c11cc2993e68ed3c3c1a1a12385b6630017ed04de36653b85fd35497e6a7f0d8b251d8aaf52827c3ee9bb970c8ba38d4f96a5988e7105e5b50e5d51d672f7f210fcc573eb732cb177282853f7ec3e71e74fa7f84bb"}) getsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f0000000900), &(0x7f00000009c0)=0x4) ioctl$KDGETKEYCODE(r5, 0x4b4c, &(0x7f0000000040)={0x6, 0x9}) lsetxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='trusted.overlay.origin\x00', &(0x7f0000000540)='y\x00', 0x2, 0x1) 03:36:10 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isi\"e', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}, 0x7fffef66}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:10 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000006c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:10 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000fdef0100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69, 0xa00e0000}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) [ 1971.552305] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isi"e=0x0000000000000e22" or missing value 03:36:10 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000007c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}, 0x7ffff000}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:10 executing program 2: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) syz_init_net_socket$ax25(0x3, 0x0, 0x5f) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f0000000040)='y\x00', 0x2, 0x2) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$nfc_llcp(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xfffffee1}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0xf2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r5 = accept$alg(r4, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xfffffee1}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0xf2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r6, 0x80046402, &(0x7f0000000380)) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0xa01200}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x30, 0x0, 0x10, 0x70bd26, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x2, 0x7, 0x7}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0xc000400) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000080), 0x4) 03:36:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69, 0xb00f0000}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) [ 1971.795189] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isi"e=0x0000000000000e22" or missing value 03:36:10 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000008c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:10 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000effd0100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:10 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isi,e', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}, 0x80020000}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:10 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000009c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69, 0xf0ffffff}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}, 0x80030020}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:11 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000005000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1972.240466] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isi" or missing value [ 1972.360179] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isi" or missing value 03:36:11 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000000000ac00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69, 0xffffff8d}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) [ 1974.561901] IPVS: ftp: loaded support on port[0] = 21 [ 1974.908167] chnl_net:caif_netlink_parms(): no params data found [ 1974.938971] bridge0: port 1(bridge_slave_0) entered blocking state [ 1974.945778] bridge0: port 1(bridge_slave_0) entered disabled state [ 1974.953266] device bridge_slave_0 entered promiscuous mode [ 1975.220377] bridge0: port 2(bridge_slave_1) entered blocking state [ 1975.226786] bridge0: port 2(bridge_slave_1) entered disabled state [ 1975.234639] device bridge_slave_1 entered promiscuous mode [ 1975.254202] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1975.266904] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1975.416874] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1975.424614] team0: Port device team_slave_0 added [ 1975.430607] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1975.438268] team0: Port device team_slave_1 added [ 1975.551945] bridge0: port 3(gretap0) entered disabled state [ 1975.559478] device gretap0 left promiscuous mode [ 1975.564308] bridge0: port 3(gretap0) entered disabled state [ 1975.631493] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1975.638964] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1975.692435] device hsr_slave_0 entered promiscuous mode [ 1975.729720] device hsr_slave_1 entered promiscuous mode [ 1975.891327] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1975.901478] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1975.919638] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1976.067332] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1976.076361] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1976.086011] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1976.092586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1976.100819] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1976.164789] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1976.171051] 8021q: adding VLAN 0 to HW filter on device team0 [ 1976.180749] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1976.187941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1976.196252] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1976.204280] bridge0: port 1(bridge_slave_0) entered blocking state [ 1976.210743] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1976.218117] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1976.230037] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1976.237850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1976.246222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1976.254415] bridge0: port 2(bridge_slave_1) entered blocking state [ 1976.260963] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1976.314890] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1976.323015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1976.334881] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1976.342303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1976.354268] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1976.362022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1976.371076] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1976.381251] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1976.390705] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1976.397977] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1976.406345] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1976.453017] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1976.460279] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1976.468116] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1976.479272] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1976.486315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1976.494984] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1976.551820] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1976.558232] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1976.575819] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1976.626886] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1976.702776] device bridge_slave_0 left promiscuous mode [ 1976.708391] bridge1: port 1(bridge_slave_0) entered disabled state [ 1976.751126] device bridge_slave_1 left promiscuous mode [ 1976.756680] bridge0: port 2(bridge_slave_1) entered disabled state 03:36:15 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000040)='./file1\x00', 0x14, 0x0) lstat(&(0x7f0000000300)='./bus/file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x3, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000440)="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") mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='lr=./bus,workdir=./file1,upperdir=./file0,\x00']) stat(&(0x7f0000000080)='./file1\x00', &(0x7f0000000280)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod$loop(&(0x7f00000000c0)='./bus/file0\x00', 0xffffc000, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) mmap$perf(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc, 0x2010, r3, 0x0) 03:36:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}, 0x8dffffff}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:15 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isiz\n', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:15 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000000000bc00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:15 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000050000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69, 0xfffffff0}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}, 0x90000000}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:15 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000000000ec00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1977.129503] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz [ 1977.129503] =0x0000000000000e22" or missing value [ 1977.234378] overlayfs: unrecognized mount option "lr=./bus" or missing value 03:36:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}, 0xf0ffffff}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:16 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000010c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1977.344996] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz [ 1977.344996] =0x0000000000000e22" or missing value 03:36:16 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isiz\"', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}, 0xffffff8d}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1977.687180] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz"=0x0000000000000e22" or missing value [ 1977.895157] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz"=0x0000000000000e22" or missing value [ 1977.921213] overlayfs: unrecognized mount option "lr=./bus" or missing value [ 1980.961666] device hsr_slave_1 left promiscuous mode [ 1981.023502] device hsr_slave_0 left promiscuous mode [ 1981.065720] team0 (unregistering): Port device team_slave_1 removed [ 1981.077792] team0 (unregistering): Port device team_slave_0 removed [ 1981.089583] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1981.153128] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1981.233478] bond0 (unregistering): Released all slaves 03:36:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:20 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000011c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}, 0xfffffff0}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:20 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isiz%', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:20 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000020100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1981.409466] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz%=0x0000000000000e22" or missing value 03:36:20 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000017c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x0, 0x1) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f0000000000)={0x5, @remote}) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f0000000040)={0x6, 0xffffffff}) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x29, 0x1, &(0x7f0000000540), 0x4) write$UHID_DESTROY(r3, &(0x7f0000000080), 0xfff2) recvmmsg(r3, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/51, 0x33}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/35, 0x23}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x7}}, {{&(0x7f0000000940)=@ax25={{0x3, @null}, [@default, @default, @default, @rose, @bcast, @default, @netrom, @null]}, 0x80, &(0x7f0000000dc0), 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{&(0x7f0000000f40)=@rc, 0x80, &(0x7f0000000fc0)=[{&(0x7f00000059c0)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f0000001100)=""/218, 0xfffffee1}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0xf2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{&(0x7f0000002880)=@nfc_llcp, 0x80, &(0x7f0000002900)=[{&(0x7f00000079c0)=""/4096, 0x1000}, {&(0x7f0000002740)=""/35, 0x23}], 0x2, &(0x7f00000089c0)=""/83, 0x53}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008a40)=""/46, 0x2e}, {&(0x7f0000008a80)=""/54, 0x36}, {&(0x7f0000008ac0)=""/173, 0xad}, {&(0x7f0000008b80)=""/62, 0x3e}, {0xfffffffffffffffe}], 0x5, &(0x7f0000008c40)=""/28, 0x1c}}, {{&(0x7f0000008c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000009d00)=[{&(0x7f0000008d00)=""/4096, 0x1000}], 0x1, &(0x7f0000009d40)=""/25, 0x19}}], 0xa, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="623989744561525c3f638f730f7f57192bf5ddd207ffffffffe4c5109b710c973bc7f80000008000000000b23aa16fb36a", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000280)=@sack_info={r6, 0x0, 0x3ff}, 0xc) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000080)={r6, @in={{0x2, 0x4e23, @broadcast}}}, &(0x7f0000000140)=0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000200)={r7, 0x48, &(0x7f0000000180)=[@in6={0xa, 0x4e24, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}, @in6={0xa, 0x4e24, 0x6, @mcast1, 0x4}, @in={0x2, 0x4e21, @empty}]}, &(0x7f0000000240)=0x10) connect$inet6(0xffffffffffffffff, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000002) writev(0xffffffffffffffff, 0x0, 0x0) accept4$bt_l2cap(0xffffffffffffffff, 0x0, 0x0, 0x80000) 03:36:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1981.563599] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz%=0x0000000000000e22" or missing value 03:36:20 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000023c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}, 0x2}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:20 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isiz,', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:20 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000030100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:20 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000060c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x2, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}, 0x4}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) [ 1982.050552] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz" or missing value 03:36:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x4, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:20 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000000000fcc00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}, 0xf}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) [ 1982.250225] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz" or missing value 03:36:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x9, 0x0) sendto$rxrpc(r1, &(0x7f0000000100)="7a336c5fda4a25071aaefa7f319bbbb36c0f0fc83910405838fec4ac700b2f19cc86e5f65e3dcd0e7b124ba94d4cc2d108e8bd4bd6aaed29092df6fe6afa7e33cdd7efd5491d9189f9729b6546ec664c4e4c6f63e18c7589643e96dd49ae276c4de2a00eb68b80ebfa5874cda92399b5e4e3dd275626a06dd1fa574a", 0x7c, 0x404, &(0x7f0000000080)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e20, 0x8000, @loopback}}, 0x24) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f00000001c0)={0x4, 'syz1\x00'}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x100, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x20}, 0x1, 0x0, 0x0, 0x400b101}, 0x0) epoll_create(0x9) 03:36:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0xf, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:21 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:21 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000630195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:21 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0xa, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}, 0x10}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) [ 1982.664309] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize [ 1982.664309] 0x0000000000000e22" or missing value 03:36:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x10, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:21 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00295c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}, 0x50}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) [ 1982.840724] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize [ 1982.840724] 0x0000000000000e22" or missing value 03:36:21 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r3 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) ftruncate(r0, 0x200) r4 = syz_init_net_socket$ax25(0x3, 0x2, 0x60) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev, @in6=@mcast1}, {@in6=@mcast2, 0x0, 0x32}, @in=@local, {}, {}, {}, 0x0, 0x0, 0xa, 0x1}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x0, 0x60}}]}, 0x13c}}, 0x0) sendfile(r4, r5, &(0x7f0000000000), 0x3) sendfile(r0, r3, 0x0, 0x10000) 03:36:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x90, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:21 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000050100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:21 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x22, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}, 0x110}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:21 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00395c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1983.044638] audit: type=1804 audit(2000000181.740:450): pid=32439 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir628551880/syzkaller.LjJ1lo/4/bus" dev="sda1" ino=16689 res=1 [ 1983.196985] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize"0x0000000000000e22" or missing value 03:36:21 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00495c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x280, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}, 0x240}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) [ 1983.373870] audit: type=1804 audit(2000000182.080:451): pid=32444 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir628551880/syzkaller.LjJ1lo/4/bus" dev="sda1" ino=16689 res=1 [ 1983.404195] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize"0x0000000000000e22" or missing value 03:36:22 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000060100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:22 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x25, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) 03:36:22 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00595c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}, 0xea0}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0xf00, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1983.728756] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize%0x0000000000000e22" or missing value 03:36:22 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00695c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:22 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000300000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1983.881935] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize%0x0000000000000e22" or missing value 03:36:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}, 0xf00}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0xf70, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:22 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00795c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) 03:36:22 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x2c, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:22 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000500000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}, 0xfb0}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x700f, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:23 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00895c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1984.335180] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize" or missing value 03:36:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}, 0x1001}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:23 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000600000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="28000000300001080000000000000000000000001400010010000100080001001218439100000000"], 0x28}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924924924924f0, 0x0) 03:36:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x8002, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1984.553919] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize" or missing value 03:36:23 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00995c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x9000, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1984.729906] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:23 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x2d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}, 0x4002}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:23 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000004000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:23 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00a95c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="28000000300001080000000000000000000000001400010010000100080001001218439100000000"], 0x28}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924924924924f0, 0x0) 03:36:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}, 0x5000}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x40000, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1984.976126] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize-0x0000000000000e22" or missing value 03:36:23 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00b95c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1985.116373] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}, 0xa00e}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:24 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x2b, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e000000130081c5e4050cecdb4cb9040a485e002000000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0x7203}, 0x0) 03:36:24 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00000000000000000fe80001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:24 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3b, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x100000, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:24 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8070238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}, 0xb00f}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:24 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000004fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) getsockopt$inet6_int(r1, 0x29, 0x8, 0x0, &(0x7f0000013000)) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000000040)) close(r0) 03:36:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0xf0ff7f, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:24 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed82c0238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:24 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:24 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x48, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}, 0x40000}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:24 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8340238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:24 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000100)=0x2000) 03:36:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x2000000, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:24 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000300000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:24 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8380238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}, 0x100000}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:24 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x5c, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:25 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000240)=0xfff, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0x150) shutdown(r0, 0x400000000000001) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) 03:36:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0xf000000, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:25 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8470238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}, 0x2000000}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:25 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000400000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:25 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed84b0238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}, 0xf000000}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x20000380, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:25 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xe48}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:25 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000500000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:25 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) r2 = dup2(r0, r1) getsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) 03:36:25 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280338dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x66efff7f, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}, 0x10010000}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:25 executing program 2: 03:36:25 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280438dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:25 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000600000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:25 executing program 2: 03:36:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}, 0x40020000}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:26 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xe5c}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x700f0000, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:26 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280538dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:26 executing program 2: 03:36:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}, 0x50000000}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:26 executing program 2: 03:36:26 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000005000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}, 0x8dffffff}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) [ 1987.634037] EXT4-fs: 11 callbacks suppressed [ 1987.634048] EXT4-fs (sda1): required extra inode space not available 03:36:26 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280638dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:26 executing program 2: 03:36:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x7fffef66, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1987.704072] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000e5c, [ 1987.827288] EXT4-fs (sda1): required extra inode space not available [ 1987.867792] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000e5c, 03:36:26 executing program 2: 03:36:26 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xe22}, 0xa}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:26 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000003a32120001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}, 0xa00e0000}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:26 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280738dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x7ffff000, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:26 executing program 2: 03:36:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}, 0xb00f0000}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:26 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280838dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1988.220729] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize=0x0000000000000e22 [ 1988.220729] " or missing value 03:36:27 executing program 2: 03:36:27 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000001fffffff01000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1988.408610] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize=0x0000000000000e22 [ 1988.408610] " or missing value 03:36:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x80020000, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:27 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280938dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:27 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xe22}, 0x22}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:27 executing program 2: 03:36:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}, 0xf0ffffff}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:27 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000102000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:27 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280a38dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:27 executing program 2: 03:36:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}, 0xffffff8d}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x80030020, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1988.814549] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize=0x0000000000000e22"" or missing value 03:36:27 executing program 2: 03:36:27 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000103000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x8dffffff, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:27 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280b38dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) [ 1989.003779] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize=0x0000000000000e22"" or missing value 03:36:27 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xe22}, 0x2d}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}, 0xfffffff0}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:27 executing program 2: 03:36:27 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000104000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:27 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280e38dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x90000000, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:28 executing program 2: userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) getsockopt$inet6_int(r0, 0x29, 0x10, 0x0, &(0x7f0000013000)) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) 03:36:28 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280228dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:28 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000240)=0xfff, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0x150) shutdown(r0, 0x400000000000001) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpid() [ 1989.540137] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize=0x0000000000000e22-" or missing value 03:36:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0xf0ffffff, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:28 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000105000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1989.709692] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize=0x0000000000000e22-" or missing value 03:36:28 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xe22}, 0x3b}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x2, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:28 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd538252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0xffffff8d, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:28 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000106000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x4, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0xfffffff0, &(0x7f0000001380)=[{0x0}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:28 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a8478baeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video35\x00', 0x2, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000400)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="fffb020000000000000027"], 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xffffffff, 0x2, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}}}) syz_open_dev$amidi(0x0, 0x0, 0x30b000) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc058560f, &(0x7f0000000300)={0x0, 0x2, 0x0, {0x0, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x70f000}}}) 03:36:29 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00000000000000011b010001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0xf, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0, 0x2}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:29 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xe22}, 0x48}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) [ 1990.345158] use of bytesused == 0 is deprecated and will be removed in the future, [ 1990.358231] use the actual size instead. 03:36:29 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e9128976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x10, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0, 0x4}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:29 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e912a976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video35\x00', 0x2, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000400)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="fffb020000000000000027"], 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xffffffff, 0x2, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}}}) syz_open_dev$amidi(0x0, 0x0, 0x30b000) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc058560f, &(0x7f0000000300)={0x0, 0x2, 0x0, {0x0, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x70f000}}}) 03:36:29 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100030001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:29 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xe22}, 0x5c}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0, 0xf}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x50, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:29 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e912c976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:29 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000180040001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x110, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:29 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e9134976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video35\x00', 0x2, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000400)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="fffb020000000000000027"], 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xffffffff, 0x2, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}}}) syz_open_dev$amidi(0x0, 0x0, 0x30b000) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc058560f, &(0x7f0000000300)={0x0, 0x2, 0x0, {0x0, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x70f000}}}) 03:36:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0, 0x10}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x240, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:30 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xe22}}]}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:30 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e9153976c5b7e34", 0x53}], 0x1}, 0x0) 03:36:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0, 0x90}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:30 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100050001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:30 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x8) ioctl(r0, 0x801000008912, &(0x7f0000000340)="0a5c2d023c126285718070") socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000000c0)) bind$inet(r1, &(0x7f0000dc9ff0)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r1, 0x1, 0xd, &(0x7f0000000100)=0x8, 0x4) prctl$PR_SET_FP_MODE(0x2d, 0x3) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x362) r2 = socket$inet(0x10, 0x0, 0xc) ftruncate(r0, 0xffffffff) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0040000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) accept4(r2, &(0x7f00000004c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000540)=0x80, 0x1000) socket$inet(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x231) 03:36:30 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e28", 0x53}], 0x1}, 0x0) 03:36:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0xea0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0, 0x280}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1991.621864] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:36:30 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100060001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 03:36:30 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xe22}}], [], 0x2}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) 03:36:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0xf00, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) 03:36:30 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e47", 0x53}], 0x1}, 0x0) 03:36:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0, 0xf00}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) 03:36:30 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fb, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0xfe20) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) ioctl$int_in(r1, 0x800000c0045002, &(0x7f0000000100)) ioctl$int_in(r1, 0x800060c0045006, &(0x7f0000000040)) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x88101) ioctl$int_in(r2, 0x800000c0045002, &(0x7f0000000100)) writev(r2, &(0x7f0000001540)=[{&(0x7f0000000200)="dd93a21493ca5073732a83da66d951f57a782172ddfb128deb43dd11353ce5a1ec7e268afec94b856fdb4e5fff46f2d58cf1337c299553e4e4d4b4f094267fb6015252f2fb8bfc47171bb789a455b3bb21fa6fb851bff6e194b4437dc9e8a376c08531263c1969748cad3d4da2e9e7dced0cbeda50328c1e8b5218bb1fed632b76799ffa49909bc640cb97379097be86476e4cc49f79a674b3e150c1296969468482e5eb0147eaa28a41db72558114cfa95c92c5f4602d5393376ca10a5d", 0xbe}, {&(0x7f00000002c0)="81841d4eb40370d5fb8c21d166653146ae677bad946bdcd55f2096e0e17fd8a75a18123533fb83d852fdca5b7241afd3478f383b9022367eddbcdced6e424c580ed8efbe7489b3281884f8ebe86e02b7af509a76af0d2383c9a9e1fa6f578295234461dbde023414e3af1d3a20e5c689b2ed99104e72794383ceaa6b1192876818e589103650bbac5c7ecbcba5a0744ea81133140646c04d4e07d0d89ea594e35e168df5aed197152b7d3f", 0xab}, {&(0x7f0000000080)="7c91966b7560e7e63d55dddcde45843809e27004a4ebc6049adfbfb03d1f081e48c8e9e2b1fc5405f81a48a096af695af1e77893fc548fe9d0e13f52e6268ef39b1fe282983fe620adbd920a49b829ddf7ad6cc7ebdcdc50c8bd2517d31757caf4d0935d5d0802f13a76bee2", 0x6c}, {0x0}, {&(0x7f0000000480)="31e5bc4a707d8525bc1ccec905b4215009beb1a95aac5afadfac329f05ca036b46171e69fbdc1ad6e037c07b83416e6f8ea7eda3c932060df672b8125773bf9b218f512a7fb0e6264e3fec75ff99d560c3cf8a9f67b461", 0x57}, {&(0x7f0000000500)}], 0x6) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYPTR=&(0x7f0000000d80)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES32, @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES64, @ANYBLOB="3c54ac164e4bf8c127b96d9b7465693901e6efa4db8d673d86520a65f933bea085a0ce3ce9dfe776d0c0027434307a497217fa2cff70e0d625a4588ed8e90d2b9615b3a5d915d2b5eb197daf8b07b4bb26a7be7d2b527ba7e4c216f14ca00d00cd"], @ANYRESDEC=r2], @ANYRESHEX, @ANYRES16, @ANYPTR, @ANYBLOB="e6c4528bd69646b1437f5622953d8b089c5357d56eb697cb9dba7f058e4c445e06"], 0x45) 03:36:30 executing program 0: io_submit(0x0, 0x2e5, &(0x7f0000000040)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x316}]) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c0000000000000001011b0001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1991.952963] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #17281: comm syz-executor.5: corrupted xattr entries [ 1992.022482] ================================================================== [ 1992.030358] BUG: KASAN: use-after-free in __ext4_expand_extra_isize+0x175/0x250 [ 1992.037812] Write of size 3586 at addr ffff8880890253a0 by task syz-executor.0/8204 [ 1992.045608] [ 1992.047247] CPU: 1 PID: 8204 Comm: syz-executor.0 Not tainted 4.19.81 #0 [ 1992.054350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1992.055648] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16530: comm syz-executor.4: corrupted xattr entries [ 1992.063813] Call Trace: [ 1992.063845] dump_stack+0x172/0x1f0 [ 1992.063869] ? __ext4_expand_extra_isize+0x175/0x250 [ 1992.063888] print_address_description.cold+0x7c/0x20d [ 1992.063902] ? __ext4_expand_extra_isize+0x175/0x250 [ 1992.063915] kasan_report.cold+0x8c/0x2ba [ 1992.063933] check_memory_region+0x123/0x190 [ 1992.078030] memset+0x24/0x40 [ 1992.078050] __ext4_expand_extra_isize+0x175/0x250 [ 1992.078068] ext4_mark_inode_dirty+0x6f0/0x940 [ 1992.078085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1992.101760] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16530: comm syz-executor.4: corrupted xattr entries [ 1992.105710] ? ext4_expand_extra_isize+0x550/0x550 [ 1992.105727] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1992.105751] ? current_time+0xde/0x140 [ 1992.123761] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16530: comm syz-executor.4: corrupted xattr entries [ 1992.123880] ? memcpy+0x46/0x50 [ 1992.150247] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16531: comm syz-executor.2: corrupted xattr entries [ 1992.160734] ? ext4_insert_dentry+0x3c3/0x490 [ 1992.160752] add_dirent_to_buf+0x402/0x680 [ 1992.160767] ? ext4_insert_dentry+0x490/0x490 [ 1992.160782] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1992.160792] ? __ext4_read_dirblock+0x3c9/0x9d0 [ 1992.160808] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1992.204775] ext4_add_entry+0x554/0xba0 [ 1992.206206] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16530: comm syz-executor.2: corrupted xattr entries [ 1992.208775] ? make_indexed_dir+0x12f0/0x12f0 [ 1992.208801] ? memcpy+0x46/0x50 [ 1992.208821] ext4_mkdir+0x73f/0xdf0 [ 1992.231737] ? ext4_init_dot_dotdot+0x520/0x520 [ 1992.232380] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16491: comm syz-executor.2: corrupted xattr entries [ 1992.236425] ? selinux_inode_mkdir+0x23/0x30 [ 1992.236441] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1992.236457] ? security_inode_mkdir+0xe4/0x120 [ 1992.236475] vfs_mkdir+0x42e/0x690 [ 1992.236493] do_mkdirat+0x234/0x2a0 [ 1992.236510] ? __ia32_sys_mknod+0xb0/0xb0 [ 1992.262838] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16491: comm syz-executor.1: corrupted xattr entries [ 1992.266155] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1992.266174] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1992.295613] ? do_syscall_64+0x26/0x620 [ 1992.299613] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1992.304229] __x64_sys_mkdir+0x5c/0x80 [ 1992.308140] do_syscall_64+0xfd/0x620 [ 1992.312098] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1992.317303] RIP: 0033:0x459367 [ 1992.320508] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1992.339888] RSP: 002b:00007ffd04bf7b28 EFLAGS: 00000206 ORIG_RAX: 0000000000000053 [ 1992.347622] RAX: ffffffffffffffda RBX: 00000000001e64b4 RCX: 0000000000459367 [ 1992.354924] RDX: 00007ffd04bf7b76 RSI: 00000000000001ff RDI: 00007ffd04bf7b70 [ 1992.362213] RBP: 0000000000003d14 R08: 0000000000000000 R09: 0000000000000006 03:36:30 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e4b", 0x53}], 0x1}, 0x0) 03:36:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r3 = accept$alg(r2, 0x0, 0x0) r4 = dup(r3) write$UHID_DESTROY(r4, &(0x7f0000000080), 0xfff2) recvmmsg(r4, &(0x7f0000009d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001000)=@xdp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001080)=""/81, 0x51}, {&(0x7f00000069c0)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001240)=""/188, 0xbc}, {&(0x7f000000a000)=""/92, 0x5c}], 0x2, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0xfb0, &(0x7f0000001440)=[{&(0x7f0000002480)=""/220, 0xdc}, {&(0x7f0000002580)=""/137, 0x89}, {&(0x7f0000002640)=""/228, 0xe4}], 0x3, &(0x7f00000027c0)=""/152, 0x98}}, {{0x0, 0x0, &(0x7f0000002900), 0x0, &(0x7f00000089c0)=""/83, 0x53}}], 0x5, 0x0, 0x0) [ 1992.369493] R10: 0000000000000064 R11: 0000000000000206 R12: 0000000000000006 [ 1992.376808] R13: 00007ffd04bf7b60 R14: 00000000001e6425 R15: 00007ffd04bf7b70 [ 1992.384100] [ 1992.385734] The buggy address belongs to the page: [ 1992.390678] page:ffffea0002240940 count:2 mapcount:0 mapping:ffff88821994db58 index:0x42d [ 1992.399013] flags: 0x1fffc0000001074(referenced|dirty|lru|active|private) [ 1992.406393] raw: 01fffc0000001074 ffffea0001b96348 ffffea0002709a08 ffff88821994db58 [ 1992.414297] raw: 000000000000042d ffff88809651f3f0 00000002ffffffff ffff888055eb6100 03:36:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) write$UHID_DESTROY(r2, &(0x7f0000000080), 0xfff2) recvmmsg(r2, &(0x7f0000009d80)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000380)}], 0x2, &(0x7f0000000400)=""/166, 0xa6}}, {{&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000840)=[{&(0x7f000000a080)=""/60, 0x3c}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f00000029c0)=""/4080, 0xff0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/177, 0xb1}, {&(0x7f0000000740)=""/195, 0xc3}], 0x6}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/140, 0x8c}}, {{0x0, 0x0, &(0x7f0000000fc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001380)=[{0x0, 0xf70}], 0x1, &(0x7f00000013c0)=""/105, 0x69}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) [ 1992.422200] page dumped because: kasan: bad access detected [ 1992.428014] page->mem_cgroup:ffff888055eb6100 [ 1992.432513] [ 1992.434147] Memory state around the buggy address: [ 1992.439172] ffff888089025f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1992.446656] ffff888089025f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1992.454070] >ffff888089026000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 1992.461422] ^ [ 1992.464779] ffff888089026080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 1992.472167] ffff888089026100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 1992.479517] ================================================================== [ 1992.486871] Disabling lock debugging due to kernel taint [ 1992.493118] Kernel panic - not syncing: panic_on_warn set ... [ 1992.493118] [ 1992.500516] CPU: 1 PID: 8204 Comm: syz-executor.0 Tainted: G B 4.19.81 #0 [ 1992.508761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1992.512869] kobject: 'loop5' (0000000061648871): kobject_uevent_env 03:36:31 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x12660b8, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xe22}}], [], 0x3}) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) [ 1992.518219] Call Trace: [ 1992.527232] dump_stack+0x172/0x1f0 [ 1992.530888] ? __ext4_expand_extra_isize+0x175/0x250 [ 1992.536171] panic+0x26a/0x50e [ 1992.538161] kobject: 'loop5' (0000000061648871): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1992.539380] ? __warn_printk+0xf3/0xf3 [ 1992.539400] ? __ext4_expand_extra_isize+0x175/0x250 [ 1992.539416] ? preempt_schedule+0x4b/0x60 [ 1992.539431] ? ___preempt_schedule+0x16/0x18 [ 1992.539446] ? trace_hardirqs_on+0x5e/0x220 [ 1992.539461] ? __ext4_expand_extra_isize+0x175/0x250 [ 1992.539481] kasan_end_report+0x47/0x4f [ 1992.577976] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16491: comm syz-executor.5: corrupted xattr entries [ 1992.579911] kasan_report.cold+0xa9/0x2ba [ 1992.579925] check_memory_region+0x123/0x190 [ 1992.579934] memset+0x24/0x40 [ 1992.579955] __ext4_expand_extra_isize+0x175/0x250 [ 1992.594241] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16491: comm syz-executor.5: corrupted xattr entries [ 1992.595896] ext4_mark_inode_dirty+0x6f0/0x940 03:36:31 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x27}], 0x1}, 0x0) [ 1992.595913] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1992.630147] ? ext4_expand_extra_isize+0x550/0x550 [ 1992.635096] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1992.640139] ? current_time+0xde/0x140 [ 1992.644039] ? memcpy+0x46/0x50 [ 1992.647333] ? ext4_insert_dentry+0x3c3/0x490 [ 1992.651850] add_dirent_to_buf+0x402/0x680 [ 1992.656108] ? ext4_insert_dentry+0x490/0x490 [ 1992.660617] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1992.666251] ? __ext4_read_dirblock+0x3c9/0x9d0 [ 1992.670909] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1992.676432] ext4_add_entry+0x554/0xba0 [ 1992.680397] ? make_indexed_dir+0x12f0/0x12f0 [ 1992.684891] ? memcpy+0x46/0x50 [ 1992.688162] ext4_mkdir+0x73f/0xdf0 [ 1992.691787] ? ext4_init_dot_dotdot+0x520/0x520 [ 1992.696452] ? selinux_inode_mkdir+0x23/0x30 [ 1992.700933] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1992.708025] ? security_inode_mkdir+0xe4/0x120 [ 1992.712603] vfs_mkdir+0x42e/0x690 [ 1992.716129] do_mkdirat+0x234/0x2a0 [ 1992.719744] ? __ia32_sys_mknod+0xb0/0xb0 [ 1992.723887] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1992.728648] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1992.734017] ? do_syscall_64+0x26/0x620 [ 1992.737981] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1992.742641] __x64_sys_mkdir+0x5c/0x80 [ 1992.746516] do_syscall_64+0xfd/0x620 [ 1992.750318] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1992.755501] RIP: 0033:0x459367 [ 1992.758677] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1992.777650] RSP: 002b:00007ffd04bf7b28 EFLAGS: 00000206 ORIG_RAX: 0000000000000053 [ 1992.785347] RAX: ffffffffffffffda RBX: 00000000001e64b4 RCX: 0000000000459367 [ 1992.792602] RDX: 00007ffd04bf7b76 RSI: 00000000000001ff RDI: 00007ffd04bf7b70 [ 1992.799857] RBP: 0000000000003d14 R08: 0000000000000000 R09: 0000000000000006 [ 1992.807112] R10: 0000000000000064 R11: 0000000000000206 R12: 0000000000000006 [ 1992.814398] R13: 00007ffd04bf7b60 R14: 00000000001e6425 R15: 00007ffd04bf7b70 [ 1992.823129] Kernel Offset: disabled [ 1992.827020] Rebooting in 86400 seconds..