x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000905b8000699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6808400, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x848026, 0x0) 09:07:01 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00130000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xb000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5c000000, 0x0, 0x848026, 0x0) 09:07:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000906b8000699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:01 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00140000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x5c, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000907b8000699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x60000000, 0x0, 0x848026, 0x0) 09:07:01 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff003f0000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000908b8000699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xc000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x8000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x68000000, 0x0, 0x848026, 0x0) 09:07:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000909b8000699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:02 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00400000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x9000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x68, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x848026, 0x0) 09:07:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc00090ab8000699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:02 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff88470000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xd000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xa000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc00090bb8000699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x74000000, 0x0, 0x848026, 0x0) 09:07:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x6c, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc00090cb8000699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xb000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:02 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff88480000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x848026, 0x0) 09:07:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xe000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc00090db8000699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:02 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff65580000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xc000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc00090eb8000699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x848026, 0x0) 09:07:02 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00600000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x74, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xd000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:02 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff58650000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc00090fb8000699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x10000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xc0000000, 0x0, 0x848026, 0x0) 09:07:02 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff007a0000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xe000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000910b8000699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x7a, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xebffffff, 0x0, 0x848026, 0x0) 09:07:02 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00810000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000911b8000699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x10000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x11000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:03 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff47880000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x848026, 0x0) [ 262.853950][T16496] EXT4-fs: 142 callbacks suppressed [ 262.853957][T16496] EXT4-fs (sda1): required extra inode space not available [ 262.872249][T16496] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, [ 262.941753][T16507] EXT4-fs (sda1): required extra inode space not available [ 262.957827][T16507] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, 09:07:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x11000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000912b8000699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:03 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff48880000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xc0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xf8f73f00, 0x0, 0x848026, 0x0) [ 262.994217][T16505] EXT4-fs (sda1): required extra inode space not available [ 263.023679][T16505] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, 09:07:03 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00fc0000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000913b8000699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x12000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x12000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 263.164999][T16524] EXT4-fs (sda1): required extra inode space not available 09:07:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x848026, 0x0) 09:07:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000914b8000699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 263.205301][T16524] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, 09:07:03 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00ff0000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1f000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 263.289910][T16533] EXT4-fs (sda1): required extra inode space not available [ 263.301660][T16533] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, 09:07:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffefffff, 0x0, 0x848026, 0x0) 09:07:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000925b8000699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x300, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:03 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00400300000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x1f000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000948b8000699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffffefff, 0x0, 0x848026, 0x0) 09:07:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:03 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00034000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:03 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000001000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc00094cb8000699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffdfd, 0x0, 0x848026, 0x0) 09:07:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x25000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000960b8000699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x500, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:03 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000002000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x20000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2d000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000968b8000699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x848026, 0x0) 09:07:04 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000003000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc00096cb8000699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:04 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000004000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffeb, 0x0, 0x848026, 0x0) 09:07:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x330f0000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x25000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x600, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000974b8000699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3b000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:04 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000005000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x848026, 0x0) 09:07:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc00097ab8000699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:04 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000006000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x700, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x2d000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000000, 0x0, 0x848026, 0x0) 09:07:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc00097cb8000699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:04 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000008000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc0009a5b8000699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x40000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:04 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000009000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x80000000000, 0x0, 0x848026, 0x0) 09:07:04 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000a000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x48000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x900, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc00090007000699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x330f0000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x777f5f22fd7f, 0x0, 0x848026, 0x0) 09:07:04 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000b000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc00090008000699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:04 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000c000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x848026, 0x0) 09:07:04 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000f000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xa00, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000599030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5c000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2000000000000, 0x0, 0x848026, 0x0) 09:07:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x3b000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:05 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000010000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8020699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x60000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000000000, 0x0, 0x848026, 0x0) 09:07:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xb00, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:05 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000011000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x68000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8030699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x8000000000000, 0x0, 0x848026, 0x0) 09:07:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:05 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000012000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8040699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x40000000000000, 0x0, 0x848026, 0x0) 09:07:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xc00, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x74000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xf83f0000000000, 0x0, 0x848026, 0x0) 09:07:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8050699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:05 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000013000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x40000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8060699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:05 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000014000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x848026, 0x0) 09:07:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xd00, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8070699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:05 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000003f000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x48000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x848026, 0x0) 09:07:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8080699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:05 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000040000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xc0000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xe00, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x848026, 0x0) 09:07:05 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000060000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8090699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xebffffff, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x848026, 0x0) 09:07:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80a0699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:06 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00005865000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xf33, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80b0699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x848026, 0x0) 09:07:06 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000007a000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x5c000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xf8f73f00, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80c0699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:06 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000081000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x848026, 0x0) 09:07:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80d0699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x1100, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:06 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00004788000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x680840000000000, 0x0, 0x848026, 0x0) 09:07:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x68000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:06 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00004888000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffefffff, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80e0699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:06 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffffffffa888000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x1200, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffffefff, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x848026, 0x0) 09:07:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80f0699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:06 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffffffffff9e000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8100699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x848026, 0x0) 09:07:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffdfd, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:06 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffffffffffe0000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x1f00, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8110699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:06 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffffffffffef000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x848026, 0x0) 09:07:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x74000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:06 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006fffffffffffffffffffff0000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8120699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x2000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x848026, 0x0) 09:07:07 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000fc000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffeb, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8130699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xb00000000000000, 0x0, 0x848026, 0x0) 09:07:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x2500, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:07 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffffffff80fe000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8140699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xc00000000000000, 0x0, 0x848026, 0x0) 09:07:07 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffffffffc0fe000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8250699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:07 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000ff000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xd00000000000000, 0x0, 0x848026, 0x0) 09:07:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x2d00, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8480699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:07 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000ffff000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xc0000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xe00000000000000, 0x0, 0x848026, 0x0) 09:07:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x80000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b84c0699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:07 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006fffffffffffffffe80ffff000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x848026, 0x0) 09:07:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8600699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x330f, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:07 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff88a8ffff000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x777f685cadff, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xebffffff, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8680699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1100000000000000, 0x0, 0x848026, 0x0) 09:07:07 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006fffffffffffffffec0ffff000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x3b00, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1200000000000000, 0x0, 0x848026, 0x0) 09:07:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b86c0699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:08 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff7fffffff000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 267.866537][T17004] EXT4-fs: 138 callbacks suppressed [ 267.866545][T17004] EXT4-fs (sda1): required extra inode space not available [ 267.880730][T17004] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, 09:07:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8740699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1f00000000000000, 0x0, 0x848026, 0x0) 09:07:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:08 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff9effffff000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 267.955580][T17012] EXT4-fs (sda1): required extra inode space not available [ 267.981820][T17012] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, 09:07:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b87a0699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:08 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffffe0ffffff000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 268.125276][T17025] EXT4-fs (sda1): required extra inode space not available [ 268.154321][T17025] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, 09:07:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x3f00, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b87c0699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x8000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:08 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffffefffffff000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x848026, 0x0) [ 268.176233][T17030] EXT4-fs (sda1): required extra inode space not available [ 268.215361][T17030] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, 09:07:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2500000000000000, 0x0, 0x848026, 0x0) 09:07:08 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006fffffffffffffff0ffffff000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 268.319115][T17044] EXT4-fs (sda1): required extra inode space not available 09:07:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xf8f73f00, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8a50699030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x40000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x330f000000000000, 0x0, 0x848026, 0x0) 09:07:08 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00020000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 268.359252][T17044] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, 09:07:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x4000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000999030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xf83f0000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:08 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00030000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x848026, 0x0) 09:07:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xfdfdffff, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000b99030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:08 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00040000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x848026, 0x0) 09:07:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8004099030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x4800, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:08 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00050000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x848026, 0x0) [ 268.817108][T17095] validate_nla: 7 callbacks suppressed [ 268.817115][T17095] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xffefffff, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:09 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00060000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000599030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:09 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00080000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x848026, 0x0) 09:07:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000999030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:09 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00090000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x4c00, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:09 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000a0000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000b99030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5c00000000000000, 0x0, 0x848026, 0x0) 09:07:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:09 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000b0000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800060a030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6000000000000000, 0x0, 0x848026, 0x0) 09:07:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x5c00, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x680840000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 269.379984][T17147] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:09 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000c0000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000664030000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x848026, 0x0) 09:07:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:09 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000f0000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 269.527665][T17161] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x6800, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x848026, 0x0) 09:07:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699020000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:09 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00100000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x848026, 0x0) [ 269.697514][T17181] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699040000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:09 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00110000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x6c00, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x848026, 0x0) 09:07:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 269.839642][T17197] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xffffffeb, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:10 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00120000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699050000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7ffd225f7f770000, 0x0, 0x848026, 0x0) 09:07:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x7400, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 269.999829][T17213] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699060000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:10 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00130000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xb00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x848026, 0x0) 09:07:10 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00140000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699070000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 270.135696][T17226] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xc00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x7a00, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xc000000000000000, 0x0, 0x848026, 0x0) 09:07:10 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00600000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 270.257894][T17239] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699080000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xebffffff00000000, 0x0, 0x848026, 0x0) 09:07:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xd00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:10 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff007a0000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 270.413297][T17252] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699090000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xc000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:10 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00fc0000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xe00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x848026, 0x0) 09:07:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990a0000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 270.593940][T17266] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:10 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000300000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xf8f73f0000000000, 0x0, 0x848026, 0x0) 09:07:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x80000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x20000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:10 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000500000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffffffffffff, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x848026, 0x0) 09:07:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990b0000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:11 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000600000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990c0000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffefffff00000000, 0x0, 0x848026, 0x0) 09:07:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x777f56c57d7f, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:11 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000900000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1100000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x40000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990d0000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x848026, 0x0) 09:07:11 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000a00000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1200000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990e0000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x848026, 0x0) 09:07:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1f00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:11 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000b00000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699100000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:11 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000c00000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x80000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699110000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:11 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x86661) ioctl$TCSBRKP(r0, 0x5425, 0x7ff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000001640)={@ipx={0x4, 0x1f, 0x7fffffff, "a46f541e79c3", 0xfb}, {&(0x7f0000000600)=""/4096, 0x1000}, &(0x7f0000001600), 0x13}, 0xa0) accept$netrom(r1, &(0x7f0000000140)={{0x3, @bcast}, [@netrom, @bcast, @default, @rose, @bcast, @bcast, @netrom, @default]}, &(0x7f00000001c0)=0x48) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000080)=""/164) 09:07:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x2000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:11 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000f00000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699120000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2500000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x3ff7f8, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:11 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00001100000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2d00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000400150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:11 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00001200000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030200000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x4000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:11 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00001300000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x330f000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030300000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:12 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00001400000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x3ff800, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3b00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030400000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:12 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00003f00000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmsg$sock(r0, &(0x7f0000000840)={&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e21, @multicast2}, 0x3, 0x1, 0x0, 0x4}}, 0x80, &(0x7f0000000740)=[{&(0x7f00000003c0)="6df635ac608a230a3729be85ce8b8feb1b894c9ff9accafc98de46b33b1416d32ef296f7d2e59400685fbdc9d4bcaf5b6a19b0bff6a1eab9a93dc8486d396d7d00d9b352536cc00bf19f7b364e7f", 0x4e}, {&(0x7f0000000340)}, {&(0x7f0000000440)="dee740d0a65e2df3e0dcd48654145a7be433c77f8daf9f00809a3ec9a3eea227517672711466cd5c33181a4bfd76e9af946469090d4fda53cf3d90df", 0x3c}, {&(0x7f0000000480)="3735a24ddb52323a1266d33f78e88e026f32031948afee6bb399e8b50973ae9d5f4a87d91dd3b332a7e320d9608b7a84dbd822b9c8296386f779f5da80da2672b1570cd93f55a5dccf182d7637b73882b5a7085f4c6b218dfacdd99beaba32497c9b661ed3418069", 0x68}, {&(0x7f0000000500)="85778b9b0d98b6e58bb3b400e1e2261006f421dcab6e6a868d8ece6aac328c07e8052e5f400f9ae0ab7e282afa4721df3a0735f6ec259fba795137e1755e6c6e84469682a2451ebf136cd3911812d6a071771dbef668f4b5a5d7d89e7f591de4a9b65777d7f8d40440c39ca8a892dba1a655e16c33d77028c3f3aa321ef41ffa5d1a79c15dd51d571a23200fa6f34ee675f2419bd2555df55b0059738437bda726a8910d4d4b32564f5d5deb79a4eea08be197350ecb27149d52250e89cf5f19db103b8cc3778d20a90a6301d5033ba3559db7da8d03039694f129c365be0cd05d8c1ea39869cf1f55740f91", 0xec}, {&(0x7f0000000600)="3e3b8f7d95574673671ade3e7c24de1f7de28b", 0x13}, {&(0x7f0000000640)="6df414b3c9c6d6e2daec5ea8265df81a1870525de77d82565ddb5aaa73604929992da74b4bfaa6836fad0efecc58db1bfbd966777500667669bc5bfb7fc27f9ef7435aa8797629890d6961d2bc8fbccd7cc9419e75baad404395feeedf6d536b57f318bfdc0197244ee5accfc440a317d1a49e01d9a1e25ce4a7f174d547776406bd05282c5368fcf2b0cf55c733298154770710c461e957132cbc6375cbf5ee26c21d004c9fd5a9d3b6156c73afe8492b337227f6bb8bdf5980c226dff5f2b0f3feee942a02c40f09699ee37efedeb415edff92bd70315d081c55ee5213a08921676c", 0xe3}], 0x7, &(0x7f00000007c0)=[@mark={{0x14, 0x1, 0x24, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0xffffffff7fffffff}}], 0x48}, 0x4000841) mount(&(0x7f00000001c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='squashfs\x00', 0x2004000, &(0x7f0000000280)='cpuset*em1loppp1\x00') mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) mount$9p_virtio(&(0x7f0000000080)='ppp1@/N\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x40, &(0x7f0000000140)={'trans=virtio,', {[{@access_any='access=any'}, {@noextend='noextend'}, {@loose='loose'}], [{@pcr={'pcr', 0x3d, 0xf}}, {@dont_appraise='dont_appraise'}, {@hash='hash'}]}}) 09:07:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x8000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:12 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00004000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030500000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x848006, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030600000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:12 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00884700000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030700000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 272.279210][T17427] squashfs: Unknown parameter 'cpuset*em1loppp1' 09:07:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030800000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 272.351580][T17436] 9pnet_virtio: no channels available for device ppp1@/N 09:07:12 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00884800000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x86661) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000800)) syz_mount_image$bfs(&(0x7f0000000080)='bfs\x00', &(0x7f00000000c0)='./file0/file0\x00', 0xffffffffffff502a, 0x8, &(0x7f0000000740)=[{&(0x7f0000000100)="4a047ad053b6db8499d2fa80a607e6a1f0d7769b9d2445b604da90c30339b2e2968e6044435745b5b10bfc395d612eeaf9df4bbafaefd85e579c55846254f453769b9066539bf310bb18c1d6dd80a68e47aecab155cdb2fe2480b3b1b1501d29049c297dc4e2f9a9cb349d04c13657600dc8c768603515ec49d66ea0138a74e35679fb2db49e33", 0x87, 0xffffffffffffff00}, {&(0x7f00000001c0)="1f2ec7b85fccc3eb87e11d307435c39f641ebafa2617084c29ca211bc2e23f5d20b92f04c6b85c405cb4d16c0823b3cd1724abee91472fede6f6e717c36df914c63bd4dd2246407f0fd20d245b79589320ee92f48d344f5a2c4a2c9ee7dfd5d9567a8fd7a2e5c2e1fd15834e9ed7968852fdb9695062770f2ee5d689cf1c444ab0c286a0b042fa28323cc99ffb7bf533de0589dad8b3c24b5c21042b1e17f15fbb6d80c225e3474c9579f04e102bf4c0dcba3718a315355672b5c5d6bf3c72d5ccf96bc1fd0f5459e4b2ef7d29cca134ca1d77bf539a0bd93f7c8d1828c51e907a06e6d8c061bb296a2be0", 0xeb, 0x5}, {&(0x7f00000003c0)="30c933f1a4a9175338e1b2002e9196bd912ca27da1d5a01951fb9a44f6700f6d137387240c67025885bc324dd7a5fb48c5ab6ffb5e80b130872744ee35a8591369ff598eec86c1b12bd97dcc849c252a516752071325dc0cb80417100dcebe99f2e94995f529c83b06804b5134e3727a6e541b6d29410a1f491b3312e19ae960e32dba20e4a195120382e15c47c7e55a190f58a37618994f4c4329705d4960e6bf244f220480030047e599a4223fd73307db91fdd14250e66b91dbe9e49c8f783455497b1de542c36fbd8097a8ed3ea3b5fcd8d8b617", 0xd6, 0x5}, {&(0x7f00000002c0)="76509d4c229d82a927536459f664cbbd78aa66ba9c05099fe66a0380c6ca0b5cacf1bf493e1e7613c725a488428d54aaadd551d020a1924941fe9bb58dd60576ca21fc102c20b238b99777f7d1a2288ba43ac1c2e12685488d1ab409d5d95b5273cf780ca7a419c7931db5f1be7ea4fcfe6fc2749f1446d7c2f461c4b64d6123fe9852dfef9b", 0x86, 0x3}, {&(0x7f00000004c0)="f9f1fb2cfd855151b50d807d0ae66c7ab50ff099012d74956c24b9530c2c3b0b", 0x20, 0x10000000}, {&(0x7f0000000500)="17604155677f0ba6942a5eec9148aa5788905c0e806710b12385238435c3e16a90a113531024a35ef137422d69279410e057fe8d7d855370b1c33b161e50d73b0c5d1bfbc5120e94171ffaeaf70c065f4fe7e4fc00efbf0c36913739d63dfd6497aadb631c0455715afe9b7d33419350c855fb076f2e9edebc6a171a71826f2265c2a84115f2996d811486670c6a7436d7e8bcf6c37274c948db42c38dbe0e3c740c1d6c86f5209d435c56c2b280167b325f880aa7cc329af7eccd79b651cc09604231befd155c6e4c2e93d4a08ba890b9efef152c4377b67bf3b9bb297f816c3caadceed4", 0xe5, 0x800}, {&(0x7f0000000600)="d975c27483d590a29ec88db4ece1c7d8e491cba46b8393547ffa331bc916bd18be38d29d22f28140fdd82b304f893df89bb16aad6d68c7857e20bef243bd771f0d7760ba6a4f599070f493d5aabc9cbe43013922621dd798b965524bac9bfa4b0bf81faef32dfe48f36bdcde0454040664a9d66780344943192f6a7ff21ef8fb8d1f6918addbab029df99499d5ce5e07919e210aa6e273000987c358f9904fc7cceb3f4b046cb0d37331156f522a1d09424cecef1122e7b463bb50be2be010af5b91e59b5f82c57c5aec5abb06bc7d4e86201b18ca8b8a6e973df6a3dd8cc2f46f421c2768d54740a2b018f904e5a5c02d3adafbed8bcab919", 0xf9, 0xffffffff}, {&(0x7f0000000700)="a5f64154e5a55daaf0959ccc5cf21f5fbe508f38df657bfa1a008464ee6f7dfd595ec1217551d324f6318a8c8a5c2d0410949284", 0x34, 0x9}], 0x2861062, 0x0) 09:07:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030900000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xf83f0000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:12 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00655800000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 272.499709][T17427] squashfs: Unknown parameter 'cpuset*em1loppp1' [ 272.500756][T17449] 9pnet_virtio: no channels available for device ppp1@/N 09:07:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xf83f00, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030a00000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:12 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00006000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030b00000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5c00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:12 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00586500000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x89bb00225129cba3, 0x0) 09:07:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:13 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00007a00000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6000000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030c00000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x1000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:13 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00008100000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030d00000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 273.039616][T17491] EXT4-fs: 133 callbacks suppressed [ 273.039623][T17491] EXT4-fs (sda1): required extra inode space not available [ 273.053390][T17491] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, 09:07:13 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00478800000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030e00000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 273.090153][T17497] EXT4-fs (sda1): required extra inode space not available [ 273.107549][T17497] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, 09:07:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 273.245918][T17511] EXT4-fs (sda1): required extra inode space not available [ 273.263026][T17511] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, [ 273.283815][T17514] EXT4-fs (sda1): required extra inode space not available 09:07:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000080)={{{@in=@broadcast, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6}}, &(0x7f0000000180)=0xe8) setfsuid(r0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) [ 273.300235][T17514] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, 09:07:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030f00000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:13 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00488800000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x2000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:13 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000fc00000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699031000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 273.518126][T17519] EXT4-fs (sda1): re-mounted. Opts: [ 273.534433][T17527] EXT4-fs (sda1): required extra inode space not available 09:07:13 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000ff00000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699031100000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x86661) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x190) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:13 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00004003000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699031200000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xc000000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x3000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xebffffff00000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:14 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000340000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 273.832599][T17559] validate_nla: 24 callbacks suppressed [ 273.832607][T17559] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699031300000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:14 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000010000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_dccp(0xa, 0x6, 0x0) fcntl$setpipe(r0, 0x407, 0x80000001) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@security={'security\x00', 0xe, 0x4, 0x448, 0x288, 0x140, 0x0, 0x288, 0x140, 0x378, 0x378, 0x378, 0x378, 0x378, 0x4, &(0x7f0000000100), {[{{@uncond, 0x0, 0x118, 0x140, 0x0, {}, [@common=@unspec=@state={0x28, 'state\x00', 0x0, {0xfff}}, @common=@icmp6={0x28, 'icmp6\x00', 0x0, {0x17}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x100, 0x8000}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x1, 0x0}, @dev={0xfe, 0x80, [], 0x24}, [0xff000000, 0xff000000, 0xff], [0xffffff00, 0xffffffff, 0xffffff00, 0xffffffff], 'gre0\x00', 'bpq0\x00', {0xff}, {0xff}, 0x2f, 0x4, 0x0, 0x4}, 0x0, 0x120, 0x148, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d2, 0x4d3, 0xe528, 0xfd}}, @common=@eui64={0x28, 'eui64\x00'}]}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@uncond, 0x0, 0xc8, 0xf0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4a8) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699031400000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 273.975117][T17571] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 274.059391][T17578] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699032500000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xf8f73f0000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x4000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:14 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000020000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 274.212341][T17592] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699034800000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:14 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000030000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffad5c687f770000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x5000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffefffff00000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 274.659230][T17604] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0xa0d00, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x8000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f00000000c0)) 09:07:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699034c00000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:14 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000040000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x6000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 274.769119][T17627] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:15 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000050000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699036000000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x680840000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffff0f, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x86661) sendmmsg(r0, &(0x7f0000004140)=[{{0x0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000080)="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", 0x1000}, {&(0x7f0000001080)="43cddadd9d2982ea10e8601285c270531c8a222ca8c45af7f26a27c0b59cc4e0375d79d1afc63cac59dbdd88074c9e78e9401b2c43b76e4b28836e245b026a6410e807a7d9b12c12946b743774ca6e42f68c9eb33b93ab787f4a0df0534556be4ee9f34eaea18db979d64fd967a11247623ba70b72a267140a739c1cd590c2b202db2a4100f9c87a2eea", 0x8a}, {&(0x7f0000001140)="d90544511638574d899f9cd84c75eab85116961284389ee56b7afaed6d427e5813c44858931fa51495a6d7dd076cb4b70fe381755f3511366b06f0071f5dd0dacd1f349606869e26243ce107299464938af8e5a9f71148d2792c848607e0ba873db1b1243fe3f050b930d1a0b38202413e32eaa53cfb596beb22b450e9c7e94d9ba069eadd4bc704ab193108fc6e315412b46b2aa9f6bebab8652fe557ca652affba9dfb5cc9c372159f53ff74964a4f3c2010609f139c3dda49b86ce8af09ac33b53ddea105059c19c831879cac4c23360e3c780d268aa76c9a701210500f195eb86a55a68896a9fdf614a53d9b85f7b541a3ffc42a8727", 0xf8}, {&(0x7f0000001240)="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", 0x1000}, {&(0x7f0000002240)="8b8dad4502ac16285cac22d315b11da1137cd0935fae6b628f434d37e4a7b154128fa7494c5f41f9de42b488f43c98a834a978936f", 0x35}, {&(0x7f0000002280)="7422ad1635b000a788bb4a01a0913aab7e81fcf9310c264d5cd34daf17e1a6923d201e70e4de330b5751c0ea6dfc09c4641ac95318d3e1d8dc62c1585ed4bbd85e84757d3f526dbda904773b92fce514152db06fbafeeb97664a3c51378b12370981", 0x62}, {&(0x7f0000002300)="e78240033a85b18a1673f52599c88052fceaee70be99b24a7d5e840ab086fcd53d7ba4a2a9f0edec145c9c092c96f37f810a736367b17ec9ae61f77a3bd3ebe3473c9f7a4725d8791ec82af5b8eea02c627c68a449182adc15c5a71d0130253c2cbb19c051d963700e3a58b682cc3c25004ef1c8e2b7f06271035890ff876f7d8b7392406248b16e7151dadf61f4483e8a9151f0ac9c36e525", 0x99}], 0x7, &(0x7f0000002440)=[{0xf0, 0x29, 0x5, "4357f12db4f1e1f901d0a07a8133ab3d888643a71c7b4013052940b6dbd1066da499d0c8b21d84e01faee4a5609ed11062fb174b6d945d1a8be36fd4207b018ed87e5daf51e845956cdef22f24220bbf4bcb4dc0a1da521b349282b5a2af5c97a545a85304b622126ddb830352d25286aad4f21487c6f29cd1729bfe0cf37e80d3516b4a6ac9827ae49cc0cd2b3fdab0f927236ce8c7a8c5ac3f4935c245c5ab2339a8c177bdaf44b984985b5b2bf6dc98f938cbae4d1b91f2f6c5125c58df892a954265bcd78f0dbb7f9d34feb0d695b2e5c75f90878526f57d92"}], 0xf0}}, {{&(0x7f0000002540)=@isdn={0x22, 0x5, 0x3f, 0x1, 0x4}, 0x80, &(0x7f0000002600)=[{&(0x7f00000025c0)="a7f7fb5af6abf28b282d17a2604cef6abaf782c7e82ead0e4176e42442f734fa3f41fa8460afd6050ee1f13f35", 0x2d}], 0x1, &(0x7f0000002640)=[{0xe0, 0x103, 0x401, "52043357f66abbc5c65f38b8ef461a5cc13d112ab049e50fc87b1708c9f494fde5e5bf2373955bcb1ddf9ab7df6c0c60dc05f83f23d74b4c40b9d01275fc0bae86ec3a9124d593f74c0e8e5ba3933cf3a7ddb779a19045b5a55374db6fb4d7dea80d44a9ef3e00b936097e772fb71542f60c37821677187fab2ae09b0d8117e3ae4ce0cbf9692cdda006d85f95b0a867af6c2ef047159ce3efe1b3821af191d4a8f4c6706c5d8be2f8fa41d7a7a1c382c6416469bd1e79a576880656ed676ba0cc5bb1436d3d272d53f57b76"}, {0xc8, 0x37e, 0x3ff, "25f40c6ceb1cbef3a4476e601bd955337c4fea7c0b7e1f84aea09fe8c6d153b138f5fb03510d91b32ad9232ca053073ea3de12b9ebb3fa5057b029648c7c0082ac135befc687f31113c3939fa537ecef1299b1056d972c6b9761ce631cf593a38422738036dd758df794a119e3a0a47e4e9e581505f441dbf16e2d2cb4f6380af24b4bd7bc1b28247973efddfd8c553c575e2cee84abdfac662da082ef03e090b7ae12d431abaa0161cd8ff7a4265c8b025196ed0bd60760"}, {0xd8, 0x21d, 0x6, "2681b1589aeaa5332a2b1282cbb8eeac4b4b1b988aa5498ed26ff2b1f6abc5af50a66d6a485c160ca9015077888dedcecf6d765f6bed361ee2cb9b79a69b5b28a2f845f5cdbe1d920cd670a300fbb27734568bbfe4cb0e7a6b5e374c5ec66caf7063ad91c285917ed0860ab445a9a642e3d8577b2edc4c7116cd52718d7022bf21040a84c979e3230cd9f2fff1f7db419d70af545c2a300e87ec11945f94bc70c1ed42b2b0f2a9b1a695c3d0cbbba014a95e734710b8751b1dfb94bccbe4a43c813de371fb72"}, {0xa0, 0x116, 0x1000000, "4fe0e689f6d2ea1f7eec64d174438c0352ac48c693766b80022315effffc3fee0f025a103d958428998c62f2c95d5bd8796df0849c4ecef3a07830213d5638c79a90f7ddb540a22a0176e3cf4758cd327b38f12959ccd81f8f97b29e0ee55715d1f7c944fdf117ed5a786ea151e95e073313e2fd8e4f28275c9f969dff4a9a0977940081fccaf5e9487784b8cd21bd"}, {0xc8, 0x113, 0xfffffffb, "bbe825fe12106e027f45b3b71da1dd021cbad9b919af70e702417e83b86e3081146a2e8220e3dafcf5320d89e4711f76a67be0863681a80d6325098a3e1e2513bf9693ee8d96baee9688c45f8076cb1b13513e0deaf047936489770cc21cb0ddf867d020e31a5eea84d5ad80405a76bb60201581290222f36409fd7709c7950be4f9728d262ca7d0fbe71fa87b60c2de14841c2cb035261af5a55c1451a050be06d6e1a75be82db6c54fb08ad37ad24dde5d"}, {0xa0, 0x100, 0x8, "714ed503d8b05f3ffcf38f073a42bf47d7af26ef3c0a49bf01b2922abbbc39e0d5fefbd8665c48528424ea7306418d8135694e0065bc1eb1a234f41dc72aac0e4cc0a13723d003e9ba479ca83ff82fb18b920b3e610c8e92685a6d850e2946042ea62fcad1eb274f18849da705e40c19fc5f0a8ba9b6637377eda2f78f02097d2ce56dd1eddad16c45"}, {0xd8, 0x107, 0x101, "30f9407f501b4b6c660ece14c620715ef729968919cd94057b57c97d508cd29c1a6cdaa5ac94410e91aea07f325151fdfd90c5d6862c5301ecf60e0c685c517ca6e6b540d61f5182a17ce279471b62f2bde29074c1ee9c3612a1f0d11d85f4fb8713c518565a69b2402273d522439194fc6acf4f951b8fb43e79d9a9f03b39d54cf4eb424ea0d8ceceb92bc7dad23bde3b0788ad11b4ed3bf951be086f8b5dcb30baa32bfe92dbf7a38f5c75d6e27f21a31356783cc5ecfa7c6b4f384e3785076b28"}, {0xe0, 0x113, 0x1, "1a2abddc6ff1e6a83a5236ca0b1a5df1881e9e6c23d586574c987fa49433344159fea028a901fd7cef82a3788bccfe66755cf189bbfc8f64a5cd727647a71fa1514fa17be82e0c51ee539a911f1d2b70f1c83c2c38b04245f900cfd583ff0f37aed1a03cca9c8cbe7fa989741b1b93119fa8f8cdde84c7467e948f780b77352d327c1be70f94734cfbc5b5d94600fd5945622fb331cbcc80bb545326ad1e630d81fa7d5ccba8f6e07641df3e5fc062cd4bdea3b1a97e94d272887f98b1b682a13ffc1f3248da1b17ea1f9cbfed76348b"}, {0x1010, 0xf05894fb47bda1ee, 0x4c, "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"}], 0x1650}}, {{&(0x7f0000003cc0)=@caif=@dgm={0x25, 0x7, 0x2}, 0x80, &(0x7f0000004080)=[{&(0x7f0000003d40)="5da1a525e63cd487bca502573559ace11344b91e647f", 0x16}, {&(0x7f0000003d80)="51025a93ca98c1de5f495a8f144a49060d0cb9ea402ac05c3035bda9f43a8a0d04d92e34d5b5b4cc8a486e13fc7bb4253e1985b27a67a20a2d65672b", 0x3c}, {&(0x7f0000003dc0)="80d637efcddcf52b672544d1da1a79bcd160229d2c7300f59357bc13f877867fa019552d825910dc6020969277008a547182227c99f03204245cfb1a9c1310aef74e8051b812a07a0103e07fc8c9045f446b0600acaa1b2b9eeca2f7da29c25ece652461f1d3", 0x66}, {&(0x7f0000003e40)="706f6d474c5bca7bd48ed00258c8f2aee6988c37b8c050a936355e403ef3b608fef8546a92f08bb6c3ad95f74b0f61c5f8d6abbe86bdec411ed75f6e472f53187bb6b8455ecbd075ec6bc788cb10da0f145fc802f67acec29f88db6b5aa6ac7c92c2c6132185a621d20ba44634271437afae10cecad2327cb1c44ea201601abf8af76f3e4fddcf0d8b8d6a84ff3a439b3e260051c38e4db0a30127faaaa5ec2c7f50a28cd7bacf440d441bb8914f31010776f1a430658f07e1fb6c233359ae844e954c3fa96e454795f9bbf3c9695400974e860f53ec431f0ce58c14e6443e63bdac", 0xe2}, {&(0x7f0000003f40)="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", 0xff}, {&(0x7f0000004040)="82399297067b894f6bc925d7afa5659348a2", 0x12}], 0x6, &(0x7f0000004200)=ANY=[@ANYBLOB="30000000000000001801000000000000d3f80f44ed669716625e2297dc9c4b6ef8c5aaa55c64f63bcb7dff22f7e334f0c9e1466f2d4200000000"], 0x30}}], 0x3, 0x20004000) 09:07:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x6808400, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'\nebug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x7000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:15 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000060000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 275.517969][T17640] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699036800000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x8000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'%ebug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 275.890460][T17677] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 277.233787][ T23] device bridge_slave_1 left promiscuous mode [ 277.240239][ T23] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.333879][ T23] device bridge_slave_0 left promiscuous mode [ 277.340635][ T23] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.001096][ T23] device hsr_slave_0 left promiscuous mode [ 281.050723][ T23] device hsr_slave_1 left promiscuous mode [ 281.132996][ T23] team0 (unregistering): Port device team_slave_1 removed [ 281.153992][ T23] team0 (unregistering): Port device team_slave_0 removed [ 281.173954][ T23] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 281.235941][ T23] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 281.370967][ T23] bond0 (unregistering): Released all slaves [ 281.497958][T17697] IPVS: ftp: loaded support on port[0] = 21 [ 281.685492][T17697] chnl_net:caif_netlink_parms(): no params data found [ 281.762971][T17697] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.770091][T17697] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.778515][T17697] device bridge_slave_0 entered promiscuous mode [ 281.787590][T17697] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.795016][T17697] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.811284][T17697] device bridge_slave_1 entered promiscuous mode [ 281.840070][T17697] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 281.851938][T17697] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 281.882202][T17697] team0: Port device team_slave_0 added [ 281.889066][T17697] team0: Port device team_slave_1 added [ 281.972857][T17697] device hsr_slave_0 entered promiscuous mode [ 282.010824][T17697] device hsr_slave_1 entered promiscuous mode [ 282.050572][T17697] debugfs: Directory 'hsr0' with parent '/' already present! [ 282.078570][T17697] bridge0: port 2(bridge_slave_1) entered blocking state [ 282.085671][T17697] bridge0: port 2(bridge_slave_1) entered forwarding state [ 282.093036][T17697] bridge0: port 1(bridge_slave_0) entered blocking state [ 282.100083][T17697] bridge0: port 1(bridge_slave_0) entered forwarding state [ 282.197036][T17697] 8021q: adding VLAN 0 to HW filter on device bond0 [ 282.210152][ T7776] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 282.225809][ T7776] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.245396][ T7776] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.276656][T17697] 8021q: adding VLAN 0 to HW filter on device team0 [ 282.305840][ T7776] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 282.316614][ T7776] bridge0: port 1(bridge_slave_0) entered blocking state [ 282.323715][ T7776] bridge0: port 1(bridge_slave_0) entered forwarding state [ 282.398680][ T106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 282.407841][ T106] bridge0: port 2(bridge_slave_1) entered blocking state [ 282.414946][ T106] bridge0: port 2(bridge_slave_1) entered forwarding state [ 282.466897][ T106] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 282.475596][ T106] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 282.506746][ T106] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 282.530091][T17697] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 282.570616][T17697] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 282.602813][ T7776] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 282.611090][ T7776] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 282.642049][T17697] 8021q: adding VLAN 0 to HW filter on device batadv0 09:07:23 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x82800, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:23 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000080000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x9000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699036c00000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'\\ebug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 282.992221][T17717] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 283.002009][T17711] EXT4-fs: 67 callbacks suppressed [ 283.002016][T17711] EXT4-fs (sda1): required extra inode space not available [ 283.015260][T17711] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, 09:07:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699037400000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:23 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000090000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 283.048879][T17713] EXT4-fs (sda1): Unrecognized mount option "\ebug_want_extra_isize=0x0000000000000400" or missing value 09:07:23 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000000a0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 283.111050][T17718] EXT4-fs (sda1): required extra inode space not available [ 283.120862][T17727] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 283.125345][T17718] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, 09:07:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699037a00000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 283.174930][T17723] EXT4-fs (sda1): re-mounted. Opts: [ 283.181520][T17729] EXT4-fs (sda1): required extra inode space not available [ 283.207163][T17729] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, 09:07:23 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000000b0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 283.230761][T17731] EXT4-fs (sda1): Unrecognized mount option "\ebug_want_extra_isize=0x0000000000000400" or missing value 09:07:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xa000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 283.289687][T17736] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 283.419039][T17742] EXT4-fs (sda1): re-mounted. Opts: 09:07:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x100000, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f00000000c0)="ce5bab5cd2f3e73b1b97aa4aa380888101495ada3d0c002d1e", &(0x7f0000000100)="81f3b5ea32c91ac608412d75a09ab4d0bb3d"}, 0x20) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699037c00000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:23 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000000c0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'d\nbug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:23 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000000f0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 283.546411][T17752] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903a500000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030003000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 283.641955][T17765] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:23 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000100000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xb000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xc00000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 283.721604][T17768] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030005000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 283.833093][T17779] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x1f) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:24 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000110000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030006000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'d%bug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:24 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000120000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030007000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 283.951519][T17786] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:24 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000130000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030009000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 284.006445][T17790] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 284.100372][T17792] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000a000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xc000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:24 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000140000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xd00000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='xfs\x00', 0x51000, &(0x7f0000000140)='posix_acl_accessbdev^vboxnet1!\x00') syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000b000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:24 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000003f0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'d\\bug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000c000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:24 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000400000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:24 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000600000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000d000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000e000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xd000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:24 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000058650000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xe00000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, &(0x7f00000000c0)=""/221, &(0x7f00000001c0)=0xdd) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000080)={{0x40, 0x0, 0xfd, 0x2, 0x2}, 0x9, 0x5}) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x7, 0x102a3, 0x0, 0x84883e, 0x0) 09:07:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000f000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:24 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000007a0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'de\nug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030011000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:24 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000810000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:25 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000047880000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) mount$9p_rdma(&(0x7f0000000080)='127.0.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x1080043, &(0x7f00000001c0)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@rq={'rq', 0x3d, 0xff}}], [{@euid_gt={'euid>', r0}}, {@dont_measure='dont_measure'}, {@subj_role={'subj_role', 0x3d, 'GPL^['}}, {@uid_lt={'uid<', r2}}, {@euid_gt={'euid>', r4}}]}}) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xfffffffffffffff, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xe000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030012000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:25 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000048880000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030013000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:25 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00ffffa8880000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:25 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00ffffff9e0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'de%ug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030014000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x10000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:25 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00ffffffe00000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030020000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:25 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00ffffffef0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030025000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903003f000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:25 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00fffffff00000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030040000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'deb\ng_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x11000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:25 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000fc0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x1100000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699038847000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:25 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00ffff80fe0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030048000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x12000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:25 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00ffffc0fe0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'deb#g_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699038848000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903004c000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:26 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000ff0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x1f000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x1200000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699036558000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:26 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000ffff0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030060000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:26 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00fe80ffff0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699035865000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:26 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0088a8ffff0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'deb%g_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030068000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x20000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:26 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00fec0ffff0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903006c000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x1f00000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:26 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff007fffffff0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:26 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff009effffff0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030074000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:26 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00e0ffffff0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903007a000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'deb*g_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x25000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903007c000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:26 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00efffffff0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030081000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:27 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00f0ffffff0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'deb+g_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699034788000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x2d000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699034888000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:27 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000200000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x2500000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300a5000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:27 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000300000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:27 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000400000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x330f0000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000600150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:27 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000500000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'deb-g_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000700150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x2d00000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:27 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000600000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000900150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:27 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000800000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:27 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000900000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000a00150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:27 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000a00000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x3b000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000001500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x330f000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'deb.g_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000001600150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:27 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000b00000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000004000150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x3b00000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:28 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000c00000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000b000150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:28 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000f00000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 288.030912][T18121] EXT4-fs: 117 callbacks suppressed [ 288.030922][T18121] EXT4-fs (sda1): required extra inode space not available 09:07:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'deb0g_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699037ffffffd00150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 288.101862][T18121] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, [ 288.131678][T18128] EXT4-fs (sda1): required extra inode space not available 09:07:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030002000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:28 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00001000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 288.146914][T18128] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, [ 288.170668][T18135] EXT4-fs (sda1): Unrecognized mount option "deb0g_want_extra_isize=0x0000000000000400" or missing value [ 288.238991][T18142] validate_nla: 32 callbacks suppressed [ 288.238997][T18142] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 288.268654][T18143] EXT4-fs (sda1): required extra inode space not available 09:07:28 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00001100000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 288.283991][T18143] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, [ 288.311620][T18146] EXT4-fs (sda1): Unrecognized mount option "deb0g_want_extra_isize=0x0000000000000400" or missing value 09:07:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x40000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:28 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00001200000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030003000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debLg_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 288.464499][T18157] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 288.473587][T18151] EXT4-fs (sda1): required extra inode space not available [ 288.491667][T18151] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, 09:07:28 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00001300000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030004000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 288.607537][T18165] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:28 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00001400000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030005000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:28 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00006000000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 288.759713][T18174] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x48000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030006000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:29 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00007a00000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debXg_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:29 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000fc00000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 288.947732][T18181] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030007000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:29 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000003000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 289.138538][T18198] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:29 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000005000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030008000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x4800000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 289.275740][T18205] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:29 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000006000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'deb\\g_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030009000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:29 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000009000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 289.438048][T18220] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x5c000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000a000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:29 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000a000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x4c00000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000b000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 289.597327][T18227] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:29 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000b000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 289.684349][T18235] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000c000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debcg_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:29 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000c000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x68000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000d000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:30 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000f000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x5c00000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000e000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:30 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000011000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000f000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:30 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000012000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030010000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debdg_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:30 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000013000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030011000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:30 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000014000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x6800000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030012000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:30 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000003f000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030013000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030014000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x74000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:30 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000040000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debhg_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030025000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x6c00000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030048000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:31 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00008847000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903004c000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:31 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00008848000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debig_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:31 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00006558000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030060000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x7400000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030068000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:31 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000060000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903006c000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:31 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00005865000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'deblg_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x7a00000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030074000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:31 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000007a000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903007a000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:31 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000081000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903007c000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:31 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00004788000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x7f7dc5567f770000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:31 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00004888000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300a5000500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debog_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xc0000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000030500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:32 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000fc000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:32 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000ff000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000050500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:32 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000200)={r1}, 0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000180)={r1, 0x3}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000080)={r2, @in={{0x2, 0x4e20, @multicast2}}, 0x10040, 0xff, 0x0, 0xfffffff7, 0x8}, &(0x7f0000000140)=0x98) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x86661) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x86661) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f0000000340)={0x81, 0x0, 0x10001, 0xffff}) ioctl$DRM_IOCTL_AGP_FREE(r5, 0x40206435, &(0x7f0000000480)={0x400, r6, 0x0, 0x33}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x401, 0x8, 0x9, 0x9, 0x3ff}, &(0x7f0000000280)=0x14) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r8, 0x407, 0x86661) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000004c0)=r7, 0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r8, 0x84, 0x1f, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x4e21, 0xffff8000, @mcast1, 0x40}}, 0x1, 0x9}, &(0x7f00000002c0)=0x90) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:32 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000040030000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:32 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000003400000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000060500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:32 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000100dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debpg_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xebffffff, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000070500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:32 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000200dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000090500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x22507d9, 0x2ea, 0x0, 0x4, 0x0) 09:07:32 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000300dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:32 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000400dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300000a0500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xc000000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:32 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000500dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x10a40, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f00000000c0)={0x5, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}, {}]}) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) fchmodat(r0, &(0x7f0000000100)='./file0\x00', 0xe6) 09:07:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300000b0500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debsg_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300000c0500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:32 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000600dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300000d0500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:32 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000800dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300000e0500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:33 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000900dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 293.070851][T18488] EXT4-fs: 107 callbacks suppressed [ 293.070860][T18488] EXT4-fs (sda1): required extra inode space not available [ 293.102930][T18488] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, 09:07:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xebffffff00000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300000f0500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:33 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000a00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x4, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debtg_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 293.120651][T18490] EXT4-fs (sda1): required extra inode space not available [ 293.129769][T18490] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, 09:07:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xf8f73f00, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:33 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000b00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000110500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:33 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000c00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000120500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 293.296082][T18505] validate_nla: 31 callbacks suppressed [ 293.296091][T18505] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 293.319963][T18500] EXT4-fs (sda1): Unrecognized mount option "debtg_want_extra_isize=0x0000000000000400" or missing value [ 293.362870][T18511] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 293.387487][T18507] EXT4-fs (sda1): required extra inode space not available [ 293.397223][T18507] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, 09:07:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000130500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:33 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000f00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 293.502143][T18516] EXT4-fs (sda1): required extra inode space not available [ 293.526919][T18516] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, [ 293.552624][T18524] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debxg_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000001c0)=0x10) keyctl$assume_authority(0x10, r1) getsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 09:07:33 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000001000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000140500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 293.681468][T18526] EXT4-fs (sda1): required extra inode space not available 09:07:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xfdfdffff, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 293.728529][T18533] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:33 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000001100dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000200500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 293.871500][T18546] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000250500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:34 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000001200dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:34 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x86661) connect$tipc(r0, &(0x7f0000000200)=@nameseq={0x1e, 0x1, 0x3, {0x0, 0x0, 0x3}}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0xb3) open(&(0x7f00000001c0)='./file0\x00', 0x40384, 0x60) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$XDP_MMAP_OFFSETS(0xffffffffffffffff, 0x11b, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0xffffff96) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848034, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x86661) r2 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$setpipe(r3, 0x407, 0x86661) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 09:07:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debzg_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300003f0500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 294.065735][T18561] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xffefffff, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:34 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000001300dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000400500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 294.157938][T18567] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:34 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000001400dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 294.235852][T18572] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030088470500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:34 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x86661) clone3(&(0x7f00000002c0)={0x4000, &(0x7f0000002800), &(0x7f0000000100), &(0x7f0000000140)=0x0, 0x2, 0x0, &(0x7f0000000180)=""/48, 0x30, &(0x7f00000001c0)=""/224}, 0x40) r2 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) r3 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r5 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r5, 0xc1105517, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) r6 = inotify_init() r7 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r7, 0xc1105517, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) fcntl$getownex(r7, 0x10, &(0x7f0000002d00)={0x0, 0x0}) lstat(&(0x7f0000002840)='./file1\x00', &(0x7f0000002880)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002900)={0x0, 0x0, 0x0}, &(0x7f0000002940)=0xc) r11 = syz_open_dev$sndmidi(&(0x7f0000002980)='/dev/snd/midiC#D#\x00', 0x9, 0x482000) r12 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r13 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r14 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r14, 0xc1105517, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) r15 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r15, 0xc1105517, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) r16 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r16, 0xc1105517, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) r17 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r17, 0xc1105517, &(0x7f00000000c0)={{0x0, 0x5, 0x4, 0x0, 'syz0\x00'}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) r18 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r18, 0xc1105517, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r19, 0x407, 0x86661) ioctl$TIOCGPGRP(r19, 0x540f, &(0x7f00000029c0)=0x0) lstat(&(0x7f0000002a00)='./file0\x00', &(0x7f0000002a40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000002ac0), &(0x7f0000002b00), &(0x7f0000002b40)=0x0) r23 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r23, 0xc1105517, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r24, 0x407, 0x86661) r25 = fsmount(r24, 0x1, 0x1) r26 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r26, 0xc1105517, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) sendmsg$netlink(r0, &(0x7f0000002c80)={&(0x7f0000000080)=@proc={0x10, 0x0, 0x25dfdbfb, 0x8c10}, 0xc, &(0x7f0000000340)=[{&(0x7f00000003c0)=ANY=[@ANYBLOB="3c2400002f00000827bd7000fc81000000000400c484d11ddd0779c80a8ba9c0da3837fbac3a149485ad878e6f4c5072175ad92447b261fc5a63ea95b401930008008d00", @ANYRES32=r1, @ANYBLOB="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"], 0x243c}, {&(0x7f0000000300)={0x18, 0x0, 0x200, 0x70bd26, 0x25dfdbfc, "", [@generic="854be68df36e"]}, 0x18}], 0x2, &(0x7f0000002b80)=[@rights={{0x24, 0x1, 0x1, [r2, r3, r4, r5, r6]}}, @cred={{0x1c, 0x1, 0x2, {r8, r9, r10}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r11, r12]}}, @rights={{0x24, 0x1, 0x1, [r13, r14, r15, r16, r17]}}, @rights={{0x14, 0x1, 0x1, [r18]}}, @cred={{0x1c, 0x1, 0x2, {r20, r21, r22}}}, @rights={{0x1c, 0x1, 0x1, [r23, r25, r26]}}], 0xe8, 0x4000}, 0x4000090) mkdir(&(0x7f0000000000)='./file0\x00', 0x1) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:34 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000003f00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 294.346780][T18583] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000480500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debu\n_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030088480500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 294.454169][T18596] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xfdfdffff00000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:34 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000004000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300004c0500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x86661) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x86661) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000000100)=0x9) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x2) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) ioctl$KVM_GET_CLOCK(r2, 0x8030ae7c, &(0x7f00000000c0)) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:34 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000006000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030065580500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:34 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000586500dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000600500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:34 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000007a00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030058650500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debu\\_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xffefffff00000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:35 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000008100dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40000, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r0, 0xc004aea7, &(0x7f00000000c0)=0x5) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000680500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:35 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000478800dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300006c0500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:35 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000488800dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:35 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000ffffa88800dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000740500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300007a0500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug\nwant_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x86661) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x3, 0x58280) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000003c0)=@newtfilter={0x4e0, 0x2c, 0xbee9c1b5d2468c04, 0x70bd26, 0x25dfdbfd, {0x0, 0x0, {0xfff3, 0x5}, {0x4}, {0x5, 0xd}}, [@filter_kind_options=@f_bpf={{0x8, 0x1, 'bpf\x00'}, {0x58, 0x2, [@TCA_BPF_ACT={0x4c, 0x1, @m_skbedit={0x48, 0x8, {{0xc, 0x1, 'skbedit\x00'}, {0x2c, 0x2, [@TCA_SKBEDIT_MARK={0x8, 0x5, 0x2}, @TCA_SKBEDIT_PTYPE={0x8}, @TCA_SKBEDIT_MARK={0x8, 0x5, 0x7fffffff}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0xfff6, 0xe}}, @TCA_SKBEDIT_PTYPE={0x8, 0x7, 0xb16a2710ae2efa50}]}, {0x8, 0x6, "3371ce20"}}}}, @TCA_BPF_FD={0x8, 0x6, r1}]}}, @TCA_CHAIN={0x8}, @filter_kind_options=@f_rsvp6={{0xc, 0x1, 'rsvp6\x00'}, {0x448, 0x2, [@TCA_RSVP_POLICE={0x408, 0x5, @TCA_POLICE_RATE={0x404, 0x2, [0xcf8, 0x5, 0xd2f9, 0x3f, 0x2, 0x0, 0x5f53, 0x1, 0x20, 0x8000, 0x9, 0x8001, 0x6, 0x5, 0x0, 0x77d2, 0x794, 0xfffffff9, 0x2, 0x7fff, 0xfff, 0x400, 0x10001, 0x1, 0x8, 0xa982, 0xbb, 0x8, 0x97, 0x8001, 0x6, 0x81, 0x3, 0x4, 0x2, 0x3f, 0x6, 0x9, 0xee, 0x0, 0x7fff, 0x4, 0xf9, 0x9, 0x3, 0x6, 0x77, 0x7, 0x6, 0x9, 0x3ff, 0x2, 0x7fff, 0x101, 0xad1, 0x9, 0x3, 0x7, 0x1, 0x8, 0xcb9, 0x843, 0x2, 0x80, 0x0, 0xe66, 0x2, 0x98, 0x703, 0x1, 0x4, 0x1, 0x40, 0x1d, 0x8, 0x7fffffff, 0x800, 0x6, 0x4, 0x6, 0x7, 0x3, 0x1, 0x9, 0x5, 0x4000800, 0x8710, 0xffff, 0xfffff086, 0x800, 0x800, 0x3, 0x7, 0x78444312, 0x81, 0x3, 0x1, 0x80000000, 0x4, 0x9, 0x80000, 0x712f, 0x3, 0x3, 0x63, 0x80, 0x12, 0x400, 0x7ff, 0xc8ec, 0x5da, 0x10000, 0x10000, 0x8, 0x2, 0x268, 0x0, 0x13a3, 0x4, 0x341b, 0x4, 0xffffffff, 0x101, 0xffffffff, 0x7, 0xfffff42a, 0x2, 0x80, 0x9, 0x7, 0x6193, 0xff, 0xd00d, 0x0, 0x4, 0x5b, 0x6d9, 0xffff, 0x0, 0x7, 0x5, 0x80, 0x3f, 0x8, 0x5, 0x2, 0x0, 0x0, 0x5, 0xffffff4b, 0x80000001, 0xd6ee, 0x0, 0x2, 0x3, 0x4, 0xae88, 0x4, 0x0, 0x1, 0xfffff801, 0x20, 0xfffffffb, 0x400, 0x10001, 0x2, 0x5, 0x9, 0x792a, 0x1, 0x5, 0x0, 0x1f, 0x1, 0x8, 0x58fd5e7a, 0x4, 0x257, 0x10001, 0x0, 0x7f, 0xffffffff, 0x0, 0x4, 0x7f, 0x1, 0x7, 0x5, 0x401, 0x101, 0x7fff0000, 0x788, 0x1, 0x8001, 0xffffffff, 0x200, 0x1ff, 0x522, 0x2, 0x3, 0x2, 0x3, 0x0, 0x33, 0x9, 0x3, 0x9, 0x4, 0x3, 0x3, 0x8, 0xa, 0x8, 0x2, 0xfffff800, 0x8e9, 0x7fffffff, 0x101, 0x1, 0x3f, 0x6a1, 0xef, 0x4, 0x4, 0x7, 0x1, 0x0, 0x0, 0x3c, 0x14e5, 0x2, 0xfffffff8, 0x80, 0x3860, 0x1, 0x10000, 0x7e, 0x9, 0x47, 0x8, 0xffffff00, 0x2, 0x4272, 0x5, 0xe09, 0x6, 0x0, 0x5, 0x4, 0xfe8a, 0x800, 0x0, 0xfffffff9, 0x200, 0x0, 0x5]}}, @TCA_RSVP_PINFO={0x20, 0x4, {{0x3, 0x9, 0x5}, {0x9, 0x0, 0x7}, 0x8, 0x3, 0x3}}, @TCA_RSVP_SRC={0x14, 0x3, @mcast1}, @TCA_RSVP_CLASSID={0x8, 0x1, {0xffe7}}]}}]}, 0x4e0}, 0x1, 0x0, 0x0, 0x800}, 0x80010) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:35 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000ffffff9e00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300007c0500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:35 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000ffffffe000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000810500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:35 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000ffffffef00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff0f, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:35 executing program 2: chroot(&(0x7f0000000080)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030047880500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_\nant_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xffffffeb, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:35 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000fffffff000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030048880500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:35 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000000fc00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000a50500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:36 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x391) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x86661) setsockopt$inet_dccp_buf(r0, 0x21, 0xf, &(0x7f00000000c0)="e77cf7126d4075b31ea5ae1a45b31a286eda49a57953483d93b54438a5cb2c9dc61a834449e70170154bc19858d1a4b337e9b5eb17e035c563ae67c8016e7f6ee5a03abbb337952c2054b2b2cc26eb8a50994a3fd81679a7b4e7ec1a9147b4a9cbe9bba05b24cb89a53ac1331e8a87ad2bd060a01c344806d31e3a57ab777d40ef196b73ba7c55fee1d1565e3f34e5bcb503c862dc0c6ecda969f50e604af79bc87c463368c4ad41f8936a2a", 0xac) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x20, 0xfffffeb3, 0x0, 0x848026, 0x0) 09:07:36 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000ffff80fe00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300000003a8150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:36 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000ffffc0fe00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x8665d) r1 = accept4$tipc(r0, &(0x7f0000000080)=@name, &(0x7f00000000c0)=0x10, 0x80000) ioctl$sock_proto_private(r1, 0x89e8, &(0x7f0000000100)="ee47f194260addc1a79fe4de210d2d4314449ae53affb047b6402cf3d9c7e13108a29e3d5decf90c69d365efc78ac7cef95d26046fe4be2b51c91552a92eaee540f833610ca1935aca92896c833b0b52c4461ce466a8a216626c0419ab543336d5b52531b48242f1937de1d11e522d1d4f9094bc2953aa") syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_w\nnt_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300000003d0150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:36 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000000ff00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:36 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000ffff00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000a80300150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:36 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000fe80ffff00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x86661) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x9, 0x280900) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000100), &(0x7f0000000140)=0x4) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000080)={0x28, 0x2, 0x0, {0x1, 0x9, 0x2}}, 0x28) r2 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) dup(r2) r3 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) fcntl$getownex(r3, 0x10, &(0x7f0000000200)) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000d00300150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:36 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000088a8ffff00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_w%nt_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000020500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:36 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000fec0ffff00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000030500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:36 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00007fffffff00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = semget$private(0x0, 0x403, 0x603) semtimedop(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x1800}], 0x1, 0x0) semctl$SETVAL(r2, 0x4, 0x10, &(0x7f0000000280)=0x3) fcntl$setpipe(r1, 0x407, 0x86661) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0xfffffffffffffd59) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000200)={r3}, 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080)={r3, 0x8}, &(0x7f00000000c0)=0x8) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) setxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:systemd_systemctl_exec_t:s0\x00', 0x2e, 0x1) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x86661) ioctl$KVM_GET_PIT2(r4, 0x8070ae9f, &(0x7f00000003c0)) readlink(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)=""/187, 0xbb) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x81, 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:37 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00009effffff00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000040500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_w\\nt_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x80000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:37 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000e0ffffff00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000050500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x86661) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) r4 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x86661) setsockopt$bt_BT_VOICE(r5, 0x112, 0xb, &(0x7f0000000800), 0x2) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r4, 0xc1105517, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) fstat(r1, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000a40)={&(0x7f00000007c0)='./file0\x00', r0}, 0x10) r7 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r7, 0xc1105517, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0xcf04, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000140)="8348da6b5aa416865674bfaed9d9ea9f7c862818a9553fad22026cb2797601c46459bb0b65d08edaa15bf3c6bd2626174d7e68603373438b158864606e49fcd060de2ec7f091c2dfe61c5b37e4da2f30d12d8d84e0837d4dbfd8afca3743aad1fb26c959715f4145776d70d847f9e582a3efaf5520c12d725a7c1af9d02e574ae12c4d10c3a9cfea46be6f02ebf847758dca077354ff9a7cccfd0f94b10f73645a3940d703537dcb1dfa0320446c3f2ac856e03eaafc043228355784be7a4d0f7ebe447a05ce93ca46a178730fff5639740ff5b4d5bd807a0e7f5d286d008cc7", 0xe0, 0x8}, {&(0x7f0000000240)="0d5e9cea4f04a06db3be78b7b54e02e7de7f2a7f9394efbd14cb2d1398777da2c177a395c2ee3edd53ddeb591984379bd2df963b4e486c386f9d9a8cff58d46431072334b6457a086c8eb9ce2b3765ec5964f0063af4ef7dff4706346877c54af0f9257d3ce6a48254a473242516eadba9d4320bb4d143e6fd7b221dc46c14d4c206928b3e4c16cea8af760f0145f0105f087edcb95132f601555e9582234689fb851823df3b47866b6e442d2eadbdc48a00b4a256", 0xb5, 0x1}, {&(0x7f0000000340)="cad6057511548833dbce9d", 0xb, 0x8009}, {&(0x7f00000003c0)="22f7095a8704211f99bf2754e24a118d4bcef5815d1db8db721567eb9f4896db8a8915aeaa8ea7114e1b3e22554cddb6f3409b3c7fcd5645919bdcd58e76077c494cab2434101c3b016adb10f2c882bf60bd687b2b674a6a0ef7acac956ca76d51e56c40cd3806be890464449664b0393df5c23e32ccc6a4344b3d0282a2fa64d7316a1acc091b7d5c2d87a292e9f4e4c11313df5bdd5fb6d417e86a", 0x9c, 0xfff}, {&(0x7f0000000480)="f02285059c7fdf7fca2c70321e94e1e58ebbe26283a33bc71aabc2f6c5734505b54ddb33026a8174d1d4cbb1bbfc459adf78494480bebfc9f566d19f83ea7891283817e6499c0c1dc0709daaa65ceb873004185a5bff5e454c891795dd25db8ccbdeadc9c4f287b64fa34f149067e1a181eaa4c3886f7c74a47784e8c8e8ef528b7503bc9f6378ae4918802149f9189aa3d61c9e1823b27755e65983f1502fee8e40baa0cadbb3d9e1f3d2994450cc68a1504604574b1abbefcdb5e89615ec3aa6b559e8cd3c26b1630071b3f25de050cc8e3f", 0xd3, 0x4}, {&(0x7f0000000580)="2a47bd52ebac32588e640c9de3ceb25808c2741cb91e6d76ce3cd5e53df094d1d263eb93a6734b9a7381022b80e1fcaddb527d7cf93a11cd7662f0f59963b665ff50c859e22951c62b7ffd0fa2949c7eddc91af92a8a7fbeb969ecd196b9dabd2e2fa1c136398a5d78914bb426378e4056cbc401275f36ab8cbc5a6dc222079c1a72dcb111bdca1701947d79c4ca59204c1e28696328a29a865c40d3f3cda65f0257936d2133d377ebfa221df1a0bb2d720a00ecc72a9911e07101cc92266c0ea280d6ec4fec812c048e787decbd422bebcf9545d863ca5ddee4ce0fcb15e37e16caa29e", 0x1f1, 0x100}, {&(0x7f0000000680)="64cd7c1883dd17730af281276f50b8dc6e473f8bfbc9a1086ef7dddc5a72bb5065f60ad86ae2f9d1b90278ea29", 0x2d, 0x6}], 0x48000, &(0x7f0000000b40)=ANY=[@ANYBLOB='jqfmt=vfsv0,dont_hash,smackfstransmute=/-,dont_appraise,fowner<', @ANYRESDEC=0x0, @ANYBLOB=',fowner<', @ANYRESOCT=r7, @ANYBLOB="2c66317346640084", @ANYRESDEC=r6, @ANYRESDEC=0x0]) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000080)={0x3, 0x0, &(0x7f0000ffc000/0x1000)=nil}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r8, 0x407, 0x86661) ioctl$VIDIOC_QBUF(r8, 0xc058560f, &(0x7f00000009c0)={0x20, 0x7, 0x4, 0x20, {0x77359400}, {0x6, 0x1, 0x1f, 0x6, 0x9, 0x0, "1c607b18"}, 0x1f, 0x1, @planes=&(0x7f0000000780)={0x5, 0x8000, @mem_offset=0x20, 0x3}, 0x4}) mmap$usbfs(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, r8, 0x0) 09:07:37 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000efffffff00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000060500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x8, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000140)={0x800, 0x3, 0xebb}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='fd/4\x00') ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f00000000c0)=0x8) 09:07:37 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000f0ffffff00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000070500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_wa\nt_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x9, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x777f69e17a3f, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:37 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000002000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000080500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:37 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000003000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xa, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:37 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x86661) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r7}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x1ed, &(0x7f0000000180)={&(0x7f0000000280)=@newlink={0x20, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r9) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in=@remote, @in6=@dev={0xfe, 0x80, [], 0x27}, 0x4e20, 0x9, 0x4e21, 0x4, 0x1, 0x61b8bbb57f1e918e, 0x30, 0x62, r5, r9}, {0x3f, 0x760d5a71, 0xfffffffffffffff9, 0x1f, 0xffffffffffffff34, 0x8, 0x7, 0x5}, {0x6, 0x7, 0x5, 0xfffffffffffffffe}, 0x0, 0x6e6bb6, 0x2, 0x0, 0x2, 0x3}, {{@in6=@rand_addr="5b1caa28e2e649bbda3f9f95c7a93a60", 0x4d3}, 0x2, @in=@rand_addr=0x1ff, 0x3507, 0x2, 0x2, 0x6, 0x8, 0xff, 0x6}}, 0xe8) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000090500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:37 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000004000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xb, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300000a0500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:38 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000005000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xc, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300000b0500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:38 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x800, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000200)={r2}, 0x8) r3 = accept$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @empty}, &(0x7f00000000c0)=0x10) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000400)=0x0) sched_getaffinity(r4, 0x8, &(0x7f0000000440)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f00000002c0)={r5, 0x60e, 0xfffffffc, 0x69d, 0x20, 0x20, 0x4, 0x10000, {r2, @in6={{0xa, 0x4e23, 0x200, @rand_addr="09fca36463c466ab52e9010955b6e62c", 0x1}}, 0x6, 0x101, 0x1, 0x0, 0x842}}, &(0x7f00000003c0)=0xb0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000180)={r2, 0x20, 0xda, "472b37cefb2fbab854ef9e1f53fa4b69e680706bfcd127916f92e98f61418205756253e94c94824ae9159c4b09e7b5091f2cdfe5a27c73b5fe4f3b507427b2c177dc6850f4f25d5984377495411163ee201b88ddd2a3a284322233401746eed98308b384f69dcc6d72f47be67369fc66f6b18341eb7d9770695538b372d98a858cf635bf99edfc65445a3a5522df5737f418a85ccaf8c259c7598f4b8dffb2ee5913078aabcb6ae49d2813f7b436d47381b9aaa3a4f09c00b255d5c5d9fcbcc8e4ce228d9dfb43c7e7ec1fcfd9773945b1750c9bda706e4be71e"}, 0xe2) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_wa%t_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:38 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000006000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xd, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300000c0500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 298.119698][T18892] EXT4-fs: 90 callbacks suppressed [ 298.119706][T18892] EXT4-fs (sda1): Unrecognized mount option "debug_wa%t_extra_isize=0x0000000000000400" or missing value 09:07:38 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000008000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300000d0500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xe, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300000e0500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 298.178433][T18893] EXT4-fs (sda1): re-mounted. Opts: [ 298.194234][T18896] EXT4-fs (sda1): required extra inode space not available [ 298.212434][T18896] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, 09:07:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x2000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:38 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000009000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 298.283193][T18908] EXT4-fs (sda1): Unrecognized mount option "debug_wa%t_extra_isize=0x0000000000000400" or missing value 09:07:38 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000a000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 298.328285][T18918] validate_nla: 26 callbacks suppressed [ 298.328291][T18918] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 298.349704][T18910] EXT4-fs (sda1): re-mounted. Opts: 09:07:38 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x86661) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x10, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_wa\\t_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300000f0500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:38 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000b000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x11, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000100500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 298.520753][T18930] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 298.539072][T18925] EXT4-fs (sda1): Unrecognized mount option "debug_wa\t_extra_isize=0x0000000000000400" or missing value 09:07:38 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000c000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 298.602068][T18927] EXT4-fs (sda1): required extra inode space not available [ 298.617169][T18927] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, [ 298.634578][T18939] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x12, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 298.749883][T18945] EXT4-fs (sda1): required extra inode space not available 09:07:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x4000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000110500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:39 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000f000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0xc0800, 0x30) fspick(r0, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x95, 0x0, 0x848026, 0x0) 09:07:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x25, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_wan\n_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:39 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000010000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 298.899538][T18957] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000120500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x1, 0x2) write$P9_RUNLINKAT(r0, &(0x7f00000000c0)={0x7, 0x4d, 0x2}, 0x7) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2d, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:39 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000011000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000130500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 298.996318][T18965] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x8000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_wan%_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3b, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 299.095113][T18975] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000140500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:39 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000012000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x10) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x20, 0x80200) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 299.228925][T18990] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x48, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000250500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:39 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000013000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_wan/_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 299.345351][T18998] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000480500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4c, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xf83f0000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:39 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000014000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5c, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:39 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000060000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 299.516912][T19016] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:39 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000007a000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300004c0500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x68, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:39 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000fc000000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_wanX_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 299.711147][T19029] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:39 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000030000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000600500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6c, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:40 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000050000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x9, 0x2) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000080)={0x101, 0x7, 0x2, 0x2b3a, 0x9, 0x7}) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x74, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000680500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:40 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000060000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300006c0500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_wan\\_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:40 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x108) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x84902e, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xffff, 0x40800) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x86661) move_mount(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000100)='./file0\x00', 0x22) 09:07:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000740500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:40 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000090000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300007a0500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xc0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:40 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000000a0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300007c0500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:40 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000000b0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000a50500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x300, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_wan\xac_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:40 executing program 2: mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2000021, 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1, 0x0) 09:07:40 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000000c0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000600150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x500, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x600, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000700150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:40 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000000f0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want\nextra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:40 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000110000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000900150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x700, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/94, 0x5e) 09:07:40 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000120000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000a00150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x900, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:41 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000130000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000001500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xa00, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_\nxtra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:41 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000140000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000001600150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:41 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000003f0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000004000150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xb00, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:41 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000400000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) r0 = dup(0xffffffffffffffff) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x800, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x86661) ioctl$RTC_EPOCH_SET(r2, 0x4008700e, 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280)={0xffffffffffffffff}, 0x200, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000a00)={0x8, 0xffffff77, 0xfa00, {0x4, {0x0, 0x3, "a11fd9bb777ed6d2de013aa84c1780812dde64019c3679140f98742d991c188999137e2c0c273c01ce5ee4a98e9a5f9621977495adc63b5e42cfed5f869c9b9c3762653da39cff6f836d3d8c2f820218e7f36d69edfe4f612f003ba171580d5d229a27995ec89a2ae6ea35537a994f882cb14b30ea1e81f4ffce42d406d795b1667439abc3912178aa17fed740c80915b5df43ad2e40db2e0c07023314ebb582148f97bf4b7f329a3f160dfa8dc19707f955096b143bd08da435072e87ba883dfc7fec35c82353166a54e432bd274068adc33e99bed553bae5b0410241e3d969c47980bfb66acc42eae3297dadf62b3f5d48f2bbbae626416b7f89ba77f540b4", 0xb9, 0x4, 0x0, 0x2, 0x100000000, 0x1, 0x3}, r3}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000080)={0x15, 0x110, 0xfa00, {r3, 0x80, 0x0, 0x0, 0x0, @ib={0x1b, 0x3, 0x4, {"b6a5976140d2ca45029f10aa69c813f2"}, 0x0, 0x3ff, 0x5}, @in={0x2, 0x4e23, @rand_addr=0x200}}}, 0x118) 09:07:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000b000150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xc00, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_%xtra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000400150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:41 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000088470000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xd00, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000600150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:41 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000088480000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xe00, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000700150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:41 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x86661) ioctl$TIOCEXCL(r0, 0x540c) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2041001, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x86661) sendmsg$sock(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)="69fba201f86c1b5f8a1eab9eb8bb62d1343b8ef4e742e18db77c5d2e356c39e0f7865f47227c1c20bf7cadd8291cc399e888caf4824babc8864886426db72d", 0x3f}, {&(0x7f00000000c0)="d145920df5916eed008a4875f5a9bcf4db965839ea6e15ca8da6d4c270671d61db5887b1", 0x24}, {&(0x7f0000000100)="55e1e9d4df84fdc86c5430044d85cfc26bae88c647ab892853da7533eb6b916530bacf88f11202e7bf259b774b81d221ac9621", 0x33}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f0000000140)="9a7a73c901576a53b9a2bb88958649283bc1ff55e659328284a59a8441c3da74dea62718bbf191743780b3e83114d5e32b1c7bd8012aca5200204d8378b84e61c308764b3a856f95e17dcf2b610c5f4a06c81d0030", 0x55}, {&(0x7f00000001c0)="42ec8bb5f683bec096269f79e6911c2c4ea26fb3717250350fd6928c02835dc826c97526743f3b", 0x27}], 0x6, &(0x7f0000000280)=[@timestamping={{0x14, 0x1, 0x25, 0x400}}, @timestamping={{0x14, 0x1, 0x25, 0x1f}}, @mark={{0x14, 0x1, 0x24, 0x7fffffff}}, @mark={{0x14, 0x1, 0x24, 0xffffff51}}, @mark={{0x14, 0x1, 0x24, 0x8}}], 0x78}, 0x48094) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:41 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000065580000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000900150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_\\xtra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:41 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000600000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x680840000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xf33, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:41 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000058650000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000a00150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000001500150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1100, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:42 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000007a0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000001600150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f00000000c0)={{0x0, 0x6, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) flock(r1, 0xc757cf0a6a74bf9f) fcntl$setpipe(r0, 0x407, 0x86661) ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f0000000080)={0x4, 0x7fffffff}) 09:07:42 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000810000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_e\ntra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000b000150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:42 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000047880000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1200, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300000003a8150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:42 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000048880000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300000003d0150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1f00, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:42 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000fc0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000080)={0x1eb, @multicast2, 0x4e1f, 0x4, 'rr\x00', 0x8, 0x282d, 0x6f}, 0xfffffffffffffea4) 09:07:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500050002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_e%tra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:42 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000ff0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300000005000b0002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2500, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500120002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:42 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000400300dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x8b0026, &(0x7f0000000540)={'trans=unix,', {[{@version_9p2000='version=9p2000'}, {@aname={'aname', 0x3d, 'version=9p2000.u'}}], [{@smackfsdef={'smackfsdef', 0x3d, 'version=9p2000.u'}}, {@uid_lt={'uid<', r1}}, {@func={'\x00', 0x3d, 'FILE_CHECK'}}, {@uid_eq={'\x03\bd', 0x3d, r5}}, {@subj_type={'subj_type', 0x3d, '$'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'selinux'}}]}}) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2d00, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:42 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000034000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000502150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_ex\nra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) clock_getres(0x2, &(0x7f0000000080)) 09:07:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:42 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000001dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x330f, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000503150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:43 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000002dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000504150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3b00, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:43 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x86661) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x86661) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000100)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x10) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x800, 0x0) 09:07:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3f00, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:43 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000003dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_ex%ra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000505150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:43 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000004dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000506150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000507150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 303.215273][T19362] EXT4-fs: 79 callbacks suppressed [ 303.215281][T19362] EXT4-fs (sda1): Unrecognized mount option "debug_want_ex%ra_isize=0x0000000000000400" or missing value 09:07:43 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000005dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4800, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 303.262146][T19372] EXT4-fs (sda1): required extra inode space not available [ 303.284143][T19372] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, 09:07:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000508150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:43 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000006dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4c00, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 303.390448][T19382] EXT4-fs (sda1): Unrecognized mount option "debug_want_ex%ra_isize=0x0000000000000400" or missing value [ 303.470963][T19383] EXT4-fs (sda1): required extra inode space not available 09:07:43 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000008dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_ex/ra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000509150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:43 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_TSC(0x1a, 0x1) fcntl$setpipe(r0, 0x407, 0x86661) r1 = accept4$tipc(r0, &(0x7f0000000080)=@id, &(0x7f00000000c0)=0x10, 0x80400) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x240000, 0x0) open_tree(r3, &(0x7f0000000200)='./file0\x00', 0x0) fcntl$setpipe(r2, 0x407, 0x86661) setsockopt$inet6_int(r2, 0x29, 0x1f, &(0x7f0000000180)=0x8000, 0x4) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000100)=""/38, &(0x7f0000000140)=0x26) [ 303.511236][T19383] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, 09:07:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5c00, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:43 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000009dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000050a150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 303.592353][T19396] EXT4-fs (sda1): re-mounted. Opts: 09:07:43 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000000000adc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 303.664161][T19403] EXT4-fs (sda1): Unrecognized mount option "debug_want_ex/ra_isize=0x0000000000000400" or missing value 09:07:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6800, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000050b150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:43 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000000000bdc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 303.739328][T19401] EXT4-fs (sda1): re-mounted. Opts: [ 303.763039][T19407] EXT4-fs (sda1): required extra inode space not available 09:07:44 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x4) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_exXra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xc00000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6c00, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000050c150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:44 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000000000cdc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000050d150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:44 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000000000fdc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7400, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000050e150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:44 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000010dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:44 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x86661) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) 09:07:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_ex\\ra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000050f150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:44 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000011dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xc000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xd00000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000510150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:44 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000012dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:44 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) shmdt(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000511150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x40000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:44 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000013dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_ex\xacra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000512150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:44 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000014dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000513150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xe00000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x80000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:44 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f00000000c0)="608eb6815ec725dfee80bb383ae1750b977d4f3d4ecdd373ec7384afd9afeb1ee940a93b0a05512cdbcb051bf02eb910356197cc2b3567b7605c7e597011e0f1dca7d945b691b4e0b0f3e19d943776276a9b8a37530475d9f67f614db8077f3dd55a663ea8d9eb7e7b4268364b6edfb068618d7493b6cac9a982b6c0d430b153da23647f078aba7e593997db1f2479ae9b111dcee269fda80c8bb64bda5f045f148d3eaa46431da6445a5062da7562918c96c1f2dbdd8fcb86ab5135e8953e4792a24dbf86ab7477a55b4a69d39a3aaa0b971516b32f691d3c89485d19214fa9721cd2946e4a39d9a52fcc384bbf246f3897600c0a405f", 0xf7) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='squashfs\x00', 0x2c347f58eb53057c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00') fcntl$setpipe(r1, 0x407, 0x86661) lremovexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', 'procvmnet0*user+\xc6\x83\x00'}) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000200)={{0x8ca9, 0x5}, 0x54a581b99dd2d2d8}, 0x382) 09:07:44 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000000003fdc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000514150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3ff7f8, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000525150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:45 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000040dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_ext\na_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3ff800, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:45 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000060dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000548150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xfffffffffffffff, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:45 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000005865dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000054c150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x848006, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:45 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x80) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x86661) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x86661) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000180)={{0x2, 0x4e23, @rand_addr=0x51}, {0x6, @remote}, 0x10, {0x2, 0x4e23, @loopback}, 'veth1_to_hsr\x00'}) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r4, &(0x7f0000000080), 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000560150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:45 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000000007adc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xf83f00, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_ext%a_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:45 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000081dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000568150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:45 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x140, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000200)={r1}, 0x8) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:45 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000004788dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000056c150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:45 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000004888dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000574150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_ext\\a_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x1100000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:45 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000ffffa888dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:45 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x1) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x86661) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000080)={0x3ae, 0x3, 0x8001, 'queue0\x00', 0xfffffff7}) 09:07:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000057a150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000057c150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:46 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000ffffff9edc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x1200000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300000005a5150002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:46 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000ffffffe0dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extr\n_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:46 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000ffffffefdc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500160002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x1f00000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6808400, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:46 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000fffffff0dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500050002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:46 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000000000fcdc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300000005000b0002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:46 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000ffff80fedc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extr%_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:46 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000ffffc0fedc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500120002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x8000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x9000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500160002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:46 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000000000ffdc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150400008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:46 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000000ffffdc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xa000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extr\\_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150202008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x2500000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:47 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000fe80ffffdc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150302008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xb000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:47 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000088a8ffffdc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:47 executing program 2: ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000080)={0x2, 0x1fe, 0x8ef, 0xa}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f00000000c0)) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) timer_create(0x2, 0x0, &(0x7f0000000540)=0x0) timer_settime(r1, 0x1, &(0x7f0000000300)={{0x0, 0x8}}, 0x0) timer_gettime(r1, &(0x7f0000000040)) timer_gettime(r1, &(0x7f0000000280)) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x86661) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000100)='./file0\x00', r3, r4) 09:07:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150402008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x2d00000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:47 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000fec0ffffdc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xc000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra\nisize', 0x3d, 0x400}}], [], 0x700}) 09:07:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150502008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:47 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000007fffffffdc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xd000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:47 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000009effffffdc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:47 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000e0ffffffdc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150602008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:47 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x86661) setns(r0, 0x30000000) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xe000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x330f000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150702008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:47 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000efffffffdc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_\nsize', 0x3d, 0x400}}], [], 0x700}) 09:07:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x10000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:47 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:47 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000f0ffffffdc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150802008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:47 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000020000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150902008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x11000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150a02008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x3b00000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:48 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000030000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150b02008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_%size', 0x3d, 0x400}}], [], 0x700}) 09:07:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x12000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) setxattr$security_smack_entry(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='security.SMACK64IPIN\x00', &(0x7f0000000100)='}vmnet0\x00', 0x8, 0x1) 09:07:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150c02008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:48 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000040000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150d02008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:48 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000050000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1f000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150e02008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:48 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000060000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 308.240389][T19796] EXT4-fs: 78 callbacks suppressed [ 308.240397][T19796] EXT4-fs (sda1): re-mounted. Opts: [ 308.264531][T19804] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_%size=0x0000000000000400" or missing value 09:07:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 308.371285][T19811] EXT4-fs (sda1): required extra inode space not available [ 308.391287][T19811] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, [ 308.408123][T19817] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_%size=0x0000000000000400" or missing value 09:07:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_\\size', 0x3d, 0x400}}], [], 0x700}) 09:07:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x80, 0x0) 09:07:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150f02008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:48 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000080000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x25000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 308.460740][T19819] EXT4-fs (sda1): required extra inode space not available [ 308.469069][T19819] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, 09:07:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x3f7ae1697f770000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500151002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2d000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:48 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000090000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 308.599621][T19831] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_\size=0x0000000000000400" or missing value 09:07:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x330f0000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500151102008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:48 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000000a0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 308.711992][T19839] EXT4-fs (sda1): required extra inode space not available [ 308.738132][T19839] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, 09:07:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_i\nize', 0x3d, 0x400}}], [], 0x700}) 09:07:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500151202008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x2) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x86661) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x2000, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00') mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0xfffffffffffffffb, 0x101842) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r2, 0x3) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, 0x0) 09:07:49 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000000b0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500151302008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:49 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000000c0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3b000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500151402008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:49 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000000f0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500152502008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_i#ize', 0x3d, 0x400}}], [], 0x700}) 09:07:49 executing program 2: mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:49 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000100000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500154802008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x4800000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x40000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500154c02008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x48000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:49 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000110000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500156002008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:49 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000120000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:49 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x86661) r2 = accept4$inet(r1, &(0x7f0000000100)={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x10, 0x80000) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000180), &(0x7f00000001c0)=0x14) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='bpf\x00', 0xc3, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]) r3 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) r4 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r4, 0xc1105517, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000200)={0x424, 0x8000, 0x5, 0x0, 0x0, [{0xffffffffffffffff, 0x0, 0x7ff}, {r4, 0x0, 0xea}, {0xffffffffffffffff, 0x0, 0x8}, {r1, 0x0, 0x9}, {r0, 0x0, 0x4c}]}) 09:07:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_i%ize', 0x3d, 0x400}}], [], 0x700}) 09:07:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500156802008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:49 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000130000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x4c00000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5c000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 309.619536][T19923] bpf: Bad value for 'mode' 09:07:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500156c02008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:49 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000140000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x68000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500157402008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:49 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000600000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500157a02008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_i*ize', 0x3d, 0x400}}], [], 0x700}) 09:07:50 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x86661) getsockname(r0, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000100)=0x80) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x86661) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f00000001c0), &(0x7f0000000200)=0x4) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x4, 0x1, &(0x7f0000000340)=[{&(0x7f00000003c0)="cda9a9795a81fe93770d563980cb3ed3f2d91dfaa8fee48dfb7a157aee97743326a2422340cdf73b41c0f1b71b0054c4a1a3fbb9f3a7b93b2f26c6d589a596ca5b1ffbe25ffff2dba935e9daaff08115ba37fd39a9f09fc7ae5efb07ec444820ccfb5cbaae5d9d563787a9500c7888903bbf5d188d227462e42a7dd196a0ac4c20e0fb73afe1ff7da3d964c6f8d1c331cf714c431a6ec918a2378cc6ce5b9748b8f1b52dd5d78a70141db3379b77350dcaec33f1b97734d95b04107219dd666c826b90f076947f4b81eba8db0600755b57459844ca513bf4f4c62d612a89e502", 0xe0}], 0x0, &(0x7f00000004c0)={[{@nouser_xattr='nouser_xattr'}], [{@appraise_type='appraise_type=imasig'}, {@subj_type={'subj_type', 0x3d, '}{\x00'}}, {@smackfshat={'smackfshat', 0x3d, '{'}}, {@fowner_lt={'fowner<'}}, {@subj_type={'subj_type', 0x3d, 'wlan0em1]@:'}}, {@measure='measure'}]}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x86661) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000200)={r5}, 0xfffffffffffffc5f) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000240)={r5, 0x9, 0x1000, 0x927, 0xffffffff, 0x6}, 0x14) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0xb) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:50 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000007a0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x5c00000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500157c02008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:50 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000fc0000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000050015a502008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:50 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000300dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x74000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_i+ize', 0x3d, 0x400}}], [], 0x700}) [ 310.118657][T19958] REISERFS warning (device loop2): super-6502 reiserfs_getopt: unknown mount option "appraise_type=imasig" 09:07:50 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000500dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150003008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 310.380822][T19986] REISERFS warning (device loop2): super-6502 reiserfs_getopt: unknown mount option "appraise_type=imasig" 09:07:50 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x98a, 0x301) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:50 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000600dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150040008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x6800000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_i-ize', 0x3d, 0x400}}], [], 0x700}) 09:07:50 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000900dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150081008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:50 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000a00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150003008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xc0000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150004008178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x6c00000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:51 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000b00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xebffffff, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_i.ize', 0x3d, 0x400}}], [], 0x700}) 09:07:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, 0x0) process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f00000002c0)=""/111, 0x6f}, {&(0x7f0000000340)=""/202, 0xca}, {&(0x7f0000000440)=""/178, 0xb2}, {&(0x7f0000000500)=""/227, 0xe3}, {&(0x7f0000000600)=""/137, 0x89}, {&(0x7f00000006c0)=""/200, 0xc8}], 0x6, &(0x7f0000000a40)=[{&(0x7f0000000840)=""/75, 0x4b}, {&(0x7f0000000140)=""/50, 0x32}, {&(0x7f00000008c0)=""/126, 0x7e}, {&(0x7f0000000940)=""/210, 0xd2}], 0x4, 0x0) ptrace$cont(0x9, r1, 0x9, 0x80) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x400, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000200)={r4}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0x200, 0x20, 0x0, 0xc186, 0x771e, 0x8, 0x2, 0x2, r4}, 0x20) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xe69f, 0x0, 0x0, 0x9cc026, 0x0) 09:07:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:51 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000c00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 311.062901][T20030] validate_nla: 11 callbacks suppressed [ 311.062907][T20030] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:07:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150000408178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:51 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000f00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x7400000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002028178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xf8f73f00, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002038178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_i0ize', 0x3d, 0x400}}], [], 0x700}) 09:07:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x86661) getsockopt(r0, 0x3, 0x249, &(0x7f0000000080)=""/193, &(0x7f0000000180)=0xc1) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x86661) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f0000000280)={0x4, &(0x7f0000000200)=[{}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @broadcast}]}) clock_gettime(0x5, &(0x7f00000002c0)) 09:07:51 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000001100dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002048178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffefffff, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x7a00000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002058178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:51 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000001200dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffffefff, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:51 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000001300dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002068178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_iLize', 0x3d, 0x400}}], [], 0x700}) 09:07:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffdfd, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002078178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:51 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000001400dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002088178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002098178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:52 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000003f00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:52 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x86661) r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f0000000100)={0x7, 0x5, 0x6, 0x4, 0x1ff, 0x1, 0x4}) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @remote}, 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x86661) renameat(r0, &(0x7f0000000140)='./file0\x00', r3, &(0x7f0000000180)='./file0\x00') 09:07:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffeb, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300000005001500020a8178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:52 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000004000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_iXize', 0x3d, 0x400}}], [], 0x700}) 09:07:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xc000000000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:52 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000884700dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300000005001500020b8178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300000005001500020c8178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:52 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000884800dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="010000007d82316f5e429324e005d35a5599633dee2d5da987eb0a5256a7541793618384a9a8c8b915bc52b75e30b161f20c2eb853f27e197166d05870820f275d74404ef9661335acf01a85a12e52ede3071903b72447fad0fa23dfcc56aa112aa5d39a6c7569313deca2983b1950eb59021a4ddb1155459c3f5c39ac763cf1b2c0ab940f3b42c77a4624682c8cc4972b442e28311071a0b1bcf808e694cf2ed61552595689b6553f23c831f8be3e513ddb5bbc", @ANYRES32=0x0], &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000200)={r2}, 0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={r2, 0x1}, &(0x7f0000000100)=0x8) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300000005001500020d8178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:52 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000655800dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x80000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_i\\ize', 0x3d, 0x400}}], [], 0x700}) 09:07:52 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000006000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300000005001500020e8178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xebffffff00000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x777f56c57d7f, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x29) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x80000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xc1760b1f43df2816, 0x0, 0x858026, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x882802, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x9, 0x1, 0x2000}, 0x4) 09:07:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x42f881b, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:52 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000586500dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300000005001500020f8178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002108178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_icize', 0x3d, 0x400}}], [], 0x700}) 09:07:53 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000007a00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002118178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0xf955ca3161105437, 0x2) execveat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=[&(0x7f0000000100)='\x00', &(0x7f0000000140)='\x00', &(0x7f0000000680)='!vboxnet1ppp1eth1vboxnet0mime_type^\x00', &(0x7f00000006c0)='\x15`h\"\xfe\xf7\x93\x98&\xf6Q\x10+Q\x1d(\x97\xfcZt\xb2\xa8\x91*n\x96\xbe5\nj\xd9\x1f&\x83\xeaz\x94\x0f\x16\xda0\x80h\x03\x8e\x06\x02Z\x8bs;\xe0\x01\xc1=\xe1r\x96a`\xe6\x11U\xda(|e\x1c^\xdd\xbd\x18\xdd\xac\x9c{OV\xf8\xd0i\xbe\"\x83\xd6Gz\xf01Hw<\xb7d\xddl$ \x93\xdd$\x94\xd4\x91-R\x82\xc8\xc9\x1b\x1e\x0f\xb8\xec\x89$\xe0\xc1\xac\xf1\x0fxpD\x1d\xbe\x00\tC8w\tR\xcdD\xbb\x1f`\xd0:\xa0\x82oT\xdb\x9e\x85\x90\xbe\xfa\xdf\x83\x88\xb5\x89\x90zd\"lhX%W\xbe\xe6\b\xc5\xc5k5r\x15', &(0x7f0000000200)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='/nodev*cgroupeth0', &(0x7f00000002c0)='cpuset\x00', &(0x7f0000000300)='\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000640)=[&(0x7f0000000440)='\x00', &(0x7f0000000480)='\x00', &(0x7f0000000780)='\xf1\x88\x91\x89\xfe\xd42\xa8\xfb\xc6s\xe1~\xf7\x9a\xc2\x8e\"X\x8f\xbf\xb0z\xf5\x00\xac\xf3\xeb\xbe\x12\x00\xcf', &(0x7f0000000500)='-@\x00', &(0x7f0000000540)='cpusettrusted/\xd1&#)(em0,keyring\x00', &(0x7f00000007c0)='eth1-\x00', &(0x7f00000005c0)='mime_type\x00', &(0x7f0000000600)='-em0selinux}\x00'], 0x1000) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002128178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:53 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000008100dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x8000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002138178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:53 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000478800dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x8, 0x0, 0x0, 0x20408, 0x0) 09:07:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_idize', 0x3d, 0x400}}], [], 0x700}) 09:07:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002148178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:53 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000488800dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xf83f0000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002258178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:53 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000000fc00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002488178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 313.426830][T20241] EXT4-fs: 77 callbacks suppressed [ 313.426839][T20241] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_idize=0x0000000000000400" or missing value 09:07:53 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000000ff00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 313.501193][T20242] EXT4-fs (sda1): required extra inode space not available [ 313.514401][T20242] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, [ 313.554481][T20252] EXT4-fs (sda1): re-mounted. Opts: [ 313.576038][T20256] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_idize=0x0000000000000400" or missing value 09:07:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_ihize', 0x3d, 0x400}}], [], 0x700}) 09:07:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300000005001500024c8178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:53 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000200dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xfdfdffff00000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 313.702559][T20263] EXT4-fs (sda1): re-mounted. Opts: 09:07:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x86661) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast1}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) lstat(&(0x7f0000000280)='./file0/../file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x2080000, &(0x7f0000000500)=ANY=[@ANYBLOB="e6643d", @ANYRESHEX, @ANYBLOB="3c726f6f746d6f0a483f6465303072cddc810a84f7fa3030303134303030302c757365725f69643d0000000000", @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',default_pers^ons,default_permissions,allow_other,blksize=0x0000000000000800,allow_other,euid=\x00\x00\x00', @ANYRESDEC=r3, @ANYBLOB=',fowner>', @ANYRESDEC=r4, @ANYBLOB=',\x00']) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002608178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:54 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000300dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 313.801662][T20267] EXT4-fs (sda1): required extra inode space not available [ 313.816922][T20267] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000400, [ 313.848926][T20275] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ihize=0x0000000000000400" or missing value 09:07:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2011001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002688178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 313.931542][T20282] EXT4-fs (sda1): required extra inode space not available 09:07:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_iiize', 0x3d, 0x400}}], [], 0x700}) 09:07:54 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000400dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xffefffff00000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300000005001500026c8178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x86661) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000080)) ioctl$KVM_S390_INTERRUPT_CPU(0xffffffffffffffff, 0x4010ae94, &(0x7f0000000140)={0x33c, 0x5, 0x100000000}) 09:07:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002748178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:54 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000500dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x680840000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:54 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000600dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300000005001500027a8178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_ilize', 0x3d, 0x400}}], [], 0x700}) 09:07:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300000005001500027c8178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:54 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000800dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:54 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000900dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002a58178a800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) r1 = signalfd4(r0, &(0x7f00000003c0)={0x7}, 0x8, 0x80000) r2 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='overlay\x00', 0x400000, &(0x7f0000000280)={[{@xino_on='xino=on'}, {@xino_off='xino=off'}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@xino_on='xino=on'}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file0'}}], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@context={'context', 0x3d, 'system_u'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@euid_eq={'euid', 0x3d, r4}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) splice(r1, &(0x7f00000000c0)=0x4a, r2, &(0x7f0000000100), 0x7ff, 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x3, 0x0, 0x0, 0x848026, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000400)={0xc, @loopback, 0x4e24, 0x1, 'lblcr\x00', 0x3, 0x7fffffff, 0x61}, 0x2c) 09:07:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b800069903000000050015000200810aa800160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:54 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000a00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:54 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000b00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 314.756533][T20351] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 314.855094][T20360] overlayfs: unrecognized mount option "rootcontext=unconfined_u" or missing value 09:07:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_ioize', 0x3d, 0x400}}], [], 0x700}) 09:07:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b80006990300000005001500020081780400160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff0f, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:55 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000c00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:55 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x86661) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=@newlink={0x24, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000080)={'vcan0\x00', r6}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f00000000c0)={0x4, @link_local}) 09:07:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xb00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:55 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000f00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800050004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a8000b0004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:55 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000001000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_ipize', 0x3d, 0x400}}], [], 0x700}) 09:07:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xc00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:55 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000001100dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800120004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:55 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x200100, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r1, 0x0, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}]}]}, 0x40}}, 0x800) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xd00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800150004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:55 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000001200dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xe00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:55 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000001300dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) lsetxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "7748ade6c253777e425f417e771f0083"}, 0x11, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x86661) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f0000000140)=0x20) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_itize', 0x3d, 0x400}}], [], 0x700}) 09:07:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a802160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffffffffffff, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:55 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000001400dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:55 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000006000dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a803160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000300)='/dev/vbi#\x00', 0x2, 0x2) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000004c0)={0x1, &(0x7f0000000340)=[{0x0}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000500)={r1, 0x2}) getxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00', &(0x7f00000003c0)=""/247, 0xf7) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) ftruncate(r3, 0x50) vmsplice(r2, &(0x7f0000000240)=[{&(0x7f0000000080)="cdb69ea49457b97252aa884a37dbc65098ac67577241946f94bfd289872b262f87a499731a7564366e1871e747f534233b8de6f1213ff4ea50f10f77e0f90826ec7f4f9fae1d3a0f48bcc2c04cb1b8f1d2e1c9853f8c4fdd5f64a33b2cd7979bd4c5465ca6b64cb04a21952646f24391e4ce338c1593cf226efaebfa183ef48d38d4d384fb7befac0eaa3e4f51df08aabcef560a56d4ccf7f1ea65ae5ced8e2b138a77001ded4e448c1672a1904749fd13f042d8a56e608595884e21c6039f473c2c47722d94127ef05174d7", 0xcc}, {&(0x7f0000000180)="2e47aeeaab83b941e00edf8996d1fcbc2136d4e4f174bddd3c39b1ba94b12cd95a9e14a9596de6be3cd9489e1e681288ace98fe203ec8e89636cd2735d47965faf85164aea386b9378625cfc35e3a29a3d1a4d576224edf2cc1c0868beaefcc2fd03296406e5487cbde0147f6a648e339121d0cdd7edcc2754114cb8a92ed49ebc84be2a534c884083e630f1652c251bfc5d09514263772a9c8a29dcc079914b4804f1f5d66d41b9dd2d4a", 0xab}], 0x2, 0x8) 09:07:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a804160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:56 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000007a00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_iuize', 0x3d, 0x400}}], [], 0x700}) 09:07:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1100000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a805160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:56 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000000fc00dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a806160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x40200, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f00000000c0)={0x7fffffff, 0xfffffff7, 0x4}) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000100)={0x10000, 0x2, 0x4000, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) 09:07:56 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000003dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1200000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a807160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 316.335372][T20483] QAT: Invalid ioctl [ 316.394158][T20488] QAT: Invalid ioctl [ 316.447725][T20488] QAT: Invalid ioctl 09:07:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_ixize', 0x3d, 0x400}}], [], 0x700}) 09:07:56 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000005dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a808160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1f00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x8, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a809160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001009, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x86661) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x24, r2, 0x11, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x1, 0x70bd25, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8110}, 0x40000010) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x9, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:56 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000006dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a80a160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:56 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000009dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2500000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xa, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a80b160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:57 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000000000adc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_izize', 0x3d, 0x400}}], [], 0x700}) 09:07:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2d00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:57 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000000000bdc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x140, 0x0) 09:07:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xb, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a80c160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x330f000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:57 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000000000cdc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_is\nze', 0x3d, 0x400}}], [], 0x700}) 09:07:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a80d160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xc, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3b00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:57 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000000000fdc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a80e160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xd, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x86661) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:57 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000011dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xe, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a80f160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_is%ze', 0x3d, 0x400}}], [], 0x700}) 09:07:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:57 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000012dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a810160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x10, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x101, 0x0) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000000100)={0x6, &(0x7f00000000c0)=[{0x8, 0x26, 0xc1, 0x7}, {0x168, 0x8, 0xf8, 0x2}, {0xfff, 0x0, 0x3, 0xdf4c}, {0x6, 0x20, 0x0, 0x828}, {0x9, 0x0, 0xfb, 0x2a}, {0xca, 0xc0, 0x1, 0x965}]}) 09:07:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:57 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000013dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x11, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a811160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:57 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000014dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_is\\ze', 0x3d, 0x400}}], [], 0x700}) 09:07:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x12, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a812160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:58 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000000003fdc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5c00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:58 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000080)={0x0, 0xffffdffc, 0x1, 0x3, 0xff, 0x800}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:07:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a813160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x25, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:58 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000040dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a814160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2d, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isi\ne', 0x3d, 0x400}}], [], 0x700}) 09:07:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a825160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:58 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000008847dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3b, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:58 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x3400) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) read(r1, &(0x7f0000000080)=""/118, 0x76) 09:07:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a848160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:58 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000008848dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x48, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a84c160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:58 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000006558dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isi\\e', 0x3d, 0x400}}], [], 0x700}) 09:07:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4c, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a860160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:58 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000060dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 318.511407][T20673] EXT4-fs: 63 callbacks suppressed [ 318.511417][T20673] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isi\e=0x0000000000000400" or missing value [ 318.641142][T20683] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isi\e=0x0000000000000400" or missing value 09:07:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x86661) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x86661) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000140)=""/43) accept4$ax25(r0, &(0x7f0000000080)={{}, [@rose, @remote, @default, @bcast, @netrom, @null, @remote, @netrom]}, &(0x7f0000000100)=0x48, 0x800) 09:07:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7f7dc5567f770000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:59 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000005865dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5c, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a868160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isiz\n', 0x3d, 0x400}}], [], 0x700}) 09:07:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a86c160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:59 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000000007adc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x68, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 319.263232][T20695] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz [ 319.263232][T20695] =0x0000000000000400" or missing value 09:07:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 319.337962][T20703] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz [ 319.337962][T20703] =0x0000000000000400" or missing value 09:07:59 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000081dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isiz%', 0x3d, 0x400}}], [], 0x700}) [ 319.412281][T20702] EXT4-fs (sda1): re-mounted. Opts: 09:07:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x84a026, 0x0) 09:07:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a874160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6c, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xc000000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:59 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000004788dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:59 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000004888dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:07:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x74, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 319.591729][T20717] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz%=0x0000000000000400" or missing value 09:07:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xebffffff00000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a87a160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:07:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:07:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a87c160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 319.712771][T20728] EXT4-fs (sda1): re-mounted. Opts: [ 319.745746][T20733] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz%=0x0000000000000400" or missing value 09:08:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isiz\\', 0x3d, 0x400}}], [], 0x700}) 09:08:00 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000000000fcdc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x400000, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f00000000c0)) 09:08:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a8a5160004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xc0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xf8f73f0000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:00 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000000000ffdc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 319.987539][T20752] EXT4-fs (sda1): re-mounted. Opts: 09:08:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800050004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 320.023768][T20756] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz\=0x0000000000000400" or missing value 09:08:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x300, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:00 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000002dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0xa, 0x400}}], [], 0x700}) 09:08:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a8000b0004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffefffff00000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:00 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000003dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:00 executing program 2: mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:08:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x500, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x600, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:00 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000004dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800120004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = dup(0xffffffffffffffff) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="2a000000040000000039700000000000040000000000000200"/42], 0x2a) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x800, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) getpeername$unix(r1, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:08:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffff0f, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x25, 0x400}}], [], 0x700}) 09:08:00 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000005dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x700, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800150004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x900, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:00 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000006dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'\\ebug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160200000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000240)='/dNv.aik#!\x00', 0x3, 0x200) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x86661) bind$rxrpc(r1, &(0x7f0000000200)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e23, 0x90c0, @loopback}}, 0x24) ioctl$KVM_RUN(r0, 0xae80, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x12cf]}) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000280)=""/174) fsetxattr$security_selinux(r2, &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2e, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, 0x0) 09:08:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800165a00000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x2d, 0x400}}], [], 0x700}) 09:08:01 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000008dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xa00, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:01 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000009dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:01 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000000000adc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xb00, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:01 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget(0x2, 0x0, 0x0) 09:08:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a80016ee01000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'d%bug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a80016f401000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:01 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000000000bdc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xc00, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3b, 0x400}}], [], 0x700}) 09:08:01 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000000000cdc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800164002000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000180)=ANY=[@ANYBLOB="646f6e745f6d6561738e72652c636f6e746578743d757365725f752c6673636f6e746578743d73"]) 09:08:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xd00, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'d\\bug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 321.322716][T20874] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800165802000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xe00, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:01 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000000000fdc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x50}}], [], 0x700}) 09:08:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800168002000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xf33, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:01 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000010dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a80016c002000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 321.534853][T20896] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:01 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000011dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:01 executing program 2: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 09:08:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1100, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'de%ug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 321.652264][T20905] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1200, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:01 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000012dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160003000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 321.834625][T20926] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x64}}], [], 0x700}) 09:08:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1f00, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:02 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000013dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800164003000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000006c0), 0x1591, 0x0, 0x0) recvmmsg(r0, &(0x7f0000002c00)=[{{&(0x7f00000003c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000440)=""/43, 0x2b}, {&(0x7f0000000480)=""/2, 0x2}, {&(0x7f00000004c0)=""/64, 0x40}, {&(0x7f0000000500)=""/8, 0x8}], 0x4, &(0x7f0000000580)=""/123, 0x7b}}, {{&(0x7f0000000600)=@in6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000680)=""/54, 0x36}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/78, 0x4e}], 0x3, &(0x7f0000000880)=""/170, 0xaa}, 0x1}, {{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000940)=""/84, 0x54}, {&(0x7f00000009c0)=""/238, 0xee}, {&(0x7f0000000ac0)=""/248, 0xf8}, {&(0x7f0000000bc0)=""/133, 0x85}, {&(0x7f0000000c80)=""/55, 0x37}, {&(0x7f0000000cc0)=""/105, 0x69}, {&(0x7f0000000d40)=""/179, 0xb3}, {&(0x7f0000000e00)=""/180, 0xb4}], 0x8, &(0x7f0000000f40)=""/72, 0x48}}, {{&(0x7f0000000fc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001040)=""/50, 0xfffffffffffffd76}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f0000001080)=""/149, 0x95}], 0x3, &(0x7f0000001180)=""/189, 0xbd}}, {{0x0, 0xffde42fa749d7803, &(0x7f00000025c0)=[{&(0x7f0000001240)=""/213, 0xd5}, {&(0x7f00000023c0)=""/113, 0x71}, {&(0x7f0000001340)=""/53, 0x35}, {&(0x7f0000002440)=""/123, 0x7b}, {&(0x7f00000024c0)=""/100, 0x64}, {&(0x7f0000002540)=""/80, 0x50}], 0x6, &(0x7f0000002640)=""/216, 0xd8}}, {{&(0x7f0000002740)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000002900)=[{&(0x7f00000027c0)=""/4, 0x4}, {&(0x7f0000002800)=""/36, 0x24}, {&(0x7f0000002840)=""/156, 0x9c}], 0x3, &(0x7f0000002940)=""/181, 0xb5}}, {{0x0, 0x0, &(0x7f0000002b40)=[{&(0x7f0000002a00)=""/219, 0xdb}, {&(0x7f0000000380)}], 0x2, &(0x7f0000002b80)=""/92, 0x5c}}], 0x7, 0x0, 0x0) 09:08:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'de\\ug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2500, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 322.042722][T20940] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800168003000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:02 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000014dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:02 executing program 2: socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x27) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r0, 0xc0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x2, 0x4}, 0x0, 0x0, &(0x7f0000000400)={0x4, 0x1, 0x1, 0x3ff}, &(0x7f0000000440)=0x4d96ddab, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x100000001}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={r1, r0, 0x0, 0x4, &(0x7f00000002c0)='vti\x00', r2}, 0x30) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, 0x0) socket$unix(0x1, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x4}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x0) 09:08:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2d00, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 322.167959][T20953] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}], [], 0x700}) 09:08:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a80016c003000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:02 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000060dc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'deb#g_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:02 executing program 2: socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x27) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r0, 0xc0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x2, 0x4}, 0x0, 0x0, &(0x7f0000000400)={0x4, 0x1, 0x1, 0x3ff}, &(0x7f0000000440)=0x4d96ddab, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x100000001}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={r1, r0, 0x0, 0x4, &(0x7f00000002c0)='vti\x00', r2}, 0x30) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, 0x0) socket$unix(0x1, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x4}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x0) 09:08:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x330f, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:02 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff0000000000007adc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 322.357973][T20967] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160204000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:02 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff000000000000fcdc1338d54400009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3b00, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:02 executing program 2: socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x27) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r0, 0xc0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x2, 0x4}, 0x0, 0x0, &(0x7f0000000400)={0x4, 0x1, 0x1, 0x3ff}, &(0x7f0000000440)=0x4d96ddab, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x100000001}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={r1, r0, 0x0, 0x4, &(0x7f00000002c0)='vti\x00', r2}, 0x30) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, 0x0) socket$unix(0x1, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x4}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x0) 09:08:02 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54402009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x402}}], [], 0x700}) 09:08:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160304000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'deb%g_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3f00, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:02 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54403009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160404000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160504000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x403}}], [], 0x700}) 09:08:03 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54404009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:03 executing program 2: socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x27) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r0, 0xc0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x2, 0x4}, 0x0, 0x0, &(0x7f0000000400)={0x4, 0x1, 0x1, 0x3ff}, &(0x7f0000000440)=0x4d96ddab, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x100000001}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={r1, r0, 0x0, 0x4, &(0x7f00000002c0)='vti\x00', r2}, 0x30) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, 0x0) socket$unix(0x1, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x4}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x0) 09:08:03 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54405009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'deb*g_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160604000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4800, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:03 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54406009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x404}}], [], 0x700}) 09:08:03 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) fremovexattr(r0, 0x0) 09:08:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160704000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4c00, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:03 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54408009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:03 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000040)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "08de06", 0x30, 0x3a, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, '\x00', 0x0, 0x0, 0x0, @mcast1, @loopback}}}}}}}, 0x0) 09:08:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160804000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:03 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54409009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'deb+g_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5c00, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160904000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:03 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d5440a009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x405}}], [], 0x700}) 09:08:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x20, 0x1, 0x7, 0x203, 0x0, 0x0, {}, [@nested={0xc, 0x7, [@typed={0x8, 0x1, @binary='7'}]}]}, 0x20}}, 0x0) 09:08:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160a04000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6800, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:03 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d5440b009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x20, 0x1, 0x7, 0x203, 0x0, 0x0, {}, [@nested={0xc, 0x7, [@typed={0x8, 0x1, @binary='7'}]}]}, 0x20}}, 0x0) [ 323.583958][T21070] EXT4-fs: 47 callbacks suppressed [ 323.583965][T21070] EXT4-fs (sda1): required extra inode space not available [ 323.611798][T21070] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000405, 09:08:03 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d5440c009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160b04000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 323.638621][T21074] EXT4-fs (sda1): Unrecognized mount option "deb+g_want_extra_isize=0x0000000000000400" or missing value 09:08:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x20, 0x1, 0x7, 0x203, 0x0, 0x0, {}, [@nested={0xc, 0x7, [@typed={0x8, 0x1, @binary='7'}]}]}, 0x20}}, 0x0) 09:08:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'deb-g_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6c00, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160c04000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 323.734388][T21086] EXT4-fs (sda1): required extra inode space not available [ 323.751860][T21086] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000405, 09:08:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x406}}], [], 0x700}) 09:08:04 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d5440f009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7400, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x20, 0x1, 0x7, 0x203, 0x0, 0x0, {}, [@nested={0xc, 0x7, [@typed={0x8, 0x1, @binary='7'}]}]}, 0x20}}, 0x0) 09:08:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160d04000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 323.888703][T21095] EXT4-fs (sda1): Unrecognized mount option "deb-g_want_extra_isize=0x0000000000000400" or missing value 09:08:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160e04000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:04 executing program 2: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x20, 0x1, 0x7, 0x203, 0x0, 0x0, {}, [@nested={0xc, 0x7, [@typed={0x8, 0x1, @binary='7'}]}]}, 0x20}}, 0x0) 09:08:04 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54410009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 324.024557][T21109] EXT4-fs (sda1): Unrecognized mount option "deb-g_want_extra_isize=0x0000000000000400" or missing value 09:08:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'deb.g_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:04 executing program 2: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x20, 0x1, 0x7, 0x203, 0x0, 0x0, {}, [@nested={0xc, 0x7, [@typed={0x8, 0x1, @binary='7'}]}]}, 0x20}}, 0x0) 09:08:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160f04000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 324.080911][T21108] EXT4-fs (sda1): required extra inode space not available [ 324.098793][T21108] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000406, [ 324.217802][T21123] EXT4-fs (sda1): Unrecognized mount option "deb.g_want_extra_isize=0x0000000000000400" or missing value 09:08:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x407}}], [], 0x700}) 09:08:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xc000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:04 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54411009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800161004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:04 executing program 2: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x20, 0x1, 0x7, 0x203, 0x0, 0x0, {}, [@nested={0xc, 0x7, [@typed={0x8, 0x1, @binary='7'}]}]}, 0x20}}, 0x0) 09:08:04 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54412009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:04 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x20, 0x1, 0x7, 0x203, 0x0, 0x0, {}, [@nested={0xc, 0x7, [@typed={0x8, 0x1, @binary='7'}]}]}, 0x20}}, 0x0) 09:08:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'deb0g_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800161104000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800161204000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:04 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54413009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x408}}], [], 0x700}) 09:08:04 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x20, 0x1, 0x7, 0x203, 0x0, 0x0, {}, [@nested={0xc, 0x7, [@typed={0x8, 0x1, @binary='7'}]}]}, 0x20}}, 0x0) 09:08:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x40000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800161304000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:04 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54414009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debLg_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x80000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800161404000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:04 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54460009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:04 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x20, 0x1, 0x7, 0x203, 0x0, 0x0, {}, [@nested={0xc, 0x7, [@typed={0x8, 0x1, @binary='7'}]}]}, 0x20}}, 0x0) 09:08:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800162504000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:05 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d5447a009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x409}}], [], 0x700}) 09:08:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3ff7f8, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:05 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d544fc009b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debXg_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, 0x0, 0x0) 09:08:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800164804000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:05 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400039b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, 0x0, 0x0) 09:08:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3ff800, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800164c04000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'deb\\g_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x848006, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x40a}}], [], 0x700}) 09:08:05 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400059b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, 0x0, 0x0) 09:08:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800166004000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:05 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400069b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 09:08:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xf83f00, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800166804000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:05 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400099b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debcg_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800166c04000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:05 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d544000a9b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x40b}}], [], 0x700}) 09:08:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 09:08:05 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d544000b9b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 09:08:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800167404000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 09:08:05 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d544000c9b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debdg_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800167a04000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:06 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d544000f9b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x40c}}], [], 0x700}) 09:08:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 09:08:06 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400119b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800167c04000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:06 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400129b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 09:08:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a80016a504000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debhg_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:06 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400139b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x40d}}], [], 0x700}) 09:08:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x20, 0x0, 0x7, 0x203, 0x0, 0x0, {}, [@nested={0xc, 0x7, [@typed={0x8, 0x1, @binary='7'}]}]}, 0x20}}, 0x0) 09:08:06 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400149b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160005000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:06 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d544003f9b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x20, 0x0, 0x7, 0x203, 0x0, 0x0, {}, [@nested={0xc, 0x7, [@typed={0x8, 0x1, @binary='7'}]}]}, 0x20}}, 0x0) [ 326.341875][T21316] netlink: 156 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6808400, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:06 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400409b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debig_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160006000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:06 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54488479b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x40e}}], [], 0x700}) 09:08:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x20, 0x0, 0x7, 0x203, 0x0, 0x0, {}, [@nested={0xc, 0x7, [@typed={0x8, 0x1, @binary='7'}]}]}, 0x20}}, 0x0) 09:08:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 326.557570][T21334] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:08:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x20, 0x1, 0x0, 0x203, 0x0, 0x0, {}, [@nested={0xc, 0x7, [@typed={0x8, 0x1, @binary='7'}]}]}, 0x20}}, 0x0) 09:08:06 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54488489b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160007000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 326.611916][T21334] netlink: 156 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160009000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 326.692765][T21347] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 326.701161][T21347] netlink: 156 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:06 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54465589b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x8000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'deblg_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x410}}], [], 0x700}) 09:08:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x20, 0x1, 0x0, 0x203, 0x0, 0x0, {}, [@nested={0xc, 0x7, [@typed={0x8, 0x1, @binary='7'}]}]}, 0x20}}, 0x0) [ 326.811952][T21358] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:08:07 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400609b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 326.867135][T21358] netlink: 152 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a80016000a000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x9000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x20, 0x1, 0x0, 0x203, 0x0, 0x0, {}, [@nested={0xc, 0x7, [@typed={0x8, 0x1, @binary='7'}]}]}, 0x20}}, 0x0) [ 326.988222][T21376] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 327.026565][T21376] netlink: 152 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:07 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54458659b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x411}}], [], 0x700}) 09:08:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a80016000b000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xa000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debog_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:07 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d544007a9b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x20, 0x1, 0x7, 0x0, 0x0, 0x0, {}, [@nested={0xc, 0x7, [@typed={0x8, 0x1, @binary='7'}]}]}, 0x20}}, 0x0) [ 327.177346][T21387] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:08:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xb000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 327.220764][T21387] netlink: 152 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a80016000c000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x412}}], [], 0x700}) 09:08:07 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400819b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x20, 0x1, 0x7, 0x0, 0x0, 0x0, {}, [@nested={0xc, 0x7, [@typed={0x8, 0x1, @binary='7'}]}]}, 0x20}}, 0x0) 09:08:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xc000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 327.341597][T21403] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 327.377524][T21403] netlink: 152 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a80016000d000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:07 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54447889b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x20, 0x1, 0x7, 0x0, 0x0, 0x0, {}, [@nested={0xc, 0x7, [@typed={0x8, 0x1, @binary='7'}]}]}, 0x20}}, 0x0) 09:08:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debpg_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xd000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 327.517473][T21417] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:08:07 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54448889b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a80016000e000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x14, 0x1, 0x7, 0x203}, 0x14}}, 0x0) 09:08:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x425}}], [], 0x700}) 09:08:07 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400fc9b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 327.688026][T21430] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 09:08:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xe000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x14, 0x1, 0x7, 0x203}, 0x14}}, 0x0) 09:08:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160011000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:07 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400ff9b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x10000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 327.826520][T21443] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 327.841070][T21443] netlink: 144 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debsg_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160012000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:08 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400029b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x14, 0x1, 0x7, 0x203}, 0x14}}, 0x0) 09:08:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x42d}}], [], 0x700}) 09:08:08 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400039b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x11000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x20, 0x1, 0x7, 0x203, 0x0, 0x0, {}, [@nested={0xc, 0x0, [@typed={0x8, 0x1, @binary='7'}]}]}, 0x20}}, 0x0) [ 328.030349][T21456] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 328.066005][T21456] netlink: 144 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160020000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x12000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x20, 0x1, 0x7, 0x203, 0x0, 0x0, {}, [@nested={0xc, 0x0, [@typed={0x8, 0x1, @binary='7'}]}]}, 0x20}}, 0x0) 09:08:08 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400049b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debtg_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160040000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 328.264826][T21474] netlink: 132 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:08 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400059b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x43b}}], [], 0x700}) 09:08:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a8001600a4000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1f000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x20, 0x1, 0x7, 0x203, 0x0, 0x0, {}, [@nested={0xc, 0x0, [@typed={0x8, 0x1, @binary='7'}]}]}, 0x20}}, 0x0) 09:08:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a8001603ff000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:08 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400069b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160002000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debxg_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x18, 0x1, 0x7, 0x203, 0x0, 0x0, {}, [@nested={0x4, 0x7}]}, 0x18}}, 0x0) 09:08:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160003000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x448}}], [], 0x700}) 09:08:08 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400089b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 328.612672][T21510] EXT4-fs: 78 callbacks suppressed [ 328.612681][T21510] EXT4-fs (sda1): Unrecognized mount option "debxg_want_extra_isize=0x0000000000000400" or missing value 09:08:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x18, 0x1, 0x7, 0x203, 0x0, 0x0, {}, [@nested={0x4, 0x7}]}, 0x18}}, 0x0) 09:08:08 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400099b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 328.705451][T21520] EXT4-fs (sda1): Unrecognized mount option "debxg_want_extra_isize=0x0000000000000400" or missing value 09:08:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160005000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x25000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debzg_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:08 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d544000a9b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 328.776226][T21523] EXT4-fs (sda1): required extra inode space not available [ 328.788205][T21523] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000448, 09:08:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x18, 0x1, 0x7, 0x203, 0x0, 0x0, {}, [@nested={0x4, 0x7}]}, 0x18}}, 0x0) 09:08:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160006000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:09 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d544000b9b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x44c}}], [], 0x700}) 09:08:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2d000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160007000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x20, 0x1, 0x7, 0x203, 0x0, 0x0, {}, [@nested={0xc, 0x7, [@typed={0x8, 0x0, @binary='7'}]}]}, 0x20}}, 0x0) 09:08:09 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d544000c9b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 328.979768][T21541] EXT4-fs (sda1): Unrecognized mount option "debzg_want_extra_isize=0x0000000000000400" or missing value 09:08:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x20, 0x1, 0x7, 0x203, 0x0, 0x0, {}, [@nested={0xc, 0x7, [@typed={0x8, 0x0, @binary='7'}]}]}, 0x20}}, 0x0) 09:08:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160008000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 329.075459][T21552] EXT4-fs (sda1): required extra inode space not available [ 329.086950][T21552] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000044c, [ 329.109910][T21555] EXT4-fs (sda1): Unrecognized mount option "debzg_want_extra_isize=0x0000000000000400" or missing value 09:08:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_w%nt_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x330f0000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:09 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d544000f9b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160009000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x20, 0x1, 0x7, 0x203, 0x0, 0x0, {}, [@nested={0xc, 0x7, [@typed={0x8, 0x0, @binary='7'}]}]}, 0x20}}, 0x0) [ 329.219729][T21561] EXT4-fs (sda1): required extra inode space not available [ 329.239866][T21561] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000044c, 09:08:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x45c}}], [], 0x700}) 09:08:09 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400109b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3b000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a80016000a000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x1c, 0x1, 0x7, 0x203, 0x0, 0x0, {}, [@nested={0x8, 0x7, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 09:08:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a80016000b000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_w\\nt_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:09 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400119b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x1c, 0x1, 0x7, 0x203, 0x0, 0x0, {}, [@nested={0x8, 0x7, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 09:08:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a80016000c000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x40000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x460}}], [], 0x700}) 09:08:09 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400129b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x1c, 0x1, 0x7, 0x203, 0x0, 0x0, {}, [@nested={0x8, 0x7, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 09:08:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a80016000d000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x48000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:09 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400139b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_wa%t_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a80016000e000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) ftruncate(r3, 0x2007fff) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r2, 0x100000003, 0x804000, 0x28120001) open(0x0, 0x0, 0x0) 09:08:10 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400149b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5c000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x468}}], [], 0x700}) 09:08:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160010000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:10 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400609b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x68000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00') mkdirat(0xffffffffffffffff, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 09:08:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160011000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:10 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d544007a9b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_wa\\t_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160012000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:10 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400fc9b84136ef75afb83de0000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 330.298893][T21649] debugfs: Directory '21649-4' with parent 'kvm' already present! 09:08:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x46c}}], [], 0x700}) 09:08:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a8001600a4000500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:10 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0200001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x74000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:10 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0300001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00') mkdirat(0xffffffffffffffff, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 09:08:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004010500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_wan%_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x474}}], [], 0x700}) 09:08:10 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0400001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160002400500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160003400500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:11 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0500001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xc0000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00') mkdirat(0xffffffffffffffff, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 09:08:11 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0600001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160002580500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_wan/_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x47a}}], [], 0x700}) 09:08:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xebffffff, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:11 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0800001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a8001600005a0500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160002800500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00') mkdirat(0xffffffffffffffff, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 09:08:11 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0900001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160003800500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_wan\\_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x4c0}}], [], 0x700}) 09:08:11 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0a00001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xf8f73f00, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160002c00500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 331.445917][T21751] __nla_validate_parse: 20 callbacks suppressed [ 331.445925][T21751] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:11 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0b00001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00') mkdirat(0xffffffffffffffff, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, 0x0) clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 09:08:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160003c00500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:11 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0c00001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffefffff, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 331.617076][T21767] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_%xtra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x500}}], [], 0x700}) 09:08:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160001ee0500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffffefff, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:11 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0f00001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00') mkdirat(0xffffffffffffffff, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, 0x0) clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 09:08:12 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de1000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160001f40500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 331.879574][T21786] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffdfd, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 331.977378][T21794] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004a80300e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:12 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de1100001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00') mkdirat(0xffffffffffffffff, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, 0x0) clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 09:08:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_\\xtra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 332.097839][T21803] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x600}}], [], 0x700}) 09:08:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004d00300e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:12 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de1200001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00') mkdirat(0xffffffffffffffff, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 09:08:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffeb, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 332.259529][T21815] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:12 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de1300001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_e%tra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:12 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de1400001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x700}}], [], 0x700}) 09:08:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:12 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de6000001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004020500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:12 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de7a00001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x80000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffffff, &(0x7f0000000000)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 09:08:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_ex%ra_isize', 0x3d, 0x400}}], [], 0x700}) [ 332.702276][T21850] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x900}}], [], 0x700}) 09:08:13 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83defc00001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x777f69e17a3f, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:13 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0003001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004030500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 09:08:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_ex/ra_isize', 0x3d, 0x400}}], [], 0x700}) [ 333.062203][T21873] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 09:08:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004040500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 333.216606][T21886] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:13 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0005001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004050500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_ex\\ra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xb00}}], [], 0x700}) [ 333.366233][T21899] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 09:08:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:13 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0006001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x8000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004060500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004070500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:13 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0009001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 333.647114][T21915] EXT4-fs: 66 callbacks suppressed [ 333.647121][T21915] EXT4-fs (sda1): required extra inode space not available [ 333.669039][T21915] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000b00, 09:08:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xf83f0000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_ext\\a_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 09:08:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xc00}}], [], 0x700}) 09:08:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004080500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:14 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de000a001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004090500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 333.957257][T21936] EXT4-fs (sda1): Unrecognized mount option "debug_want_ext\a_isize=0x0000000000000400" or missing value 09:08:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 334.041309][T21935] EXT4-fs (sda1): required extra inode space not available [ 334.052799][T21935] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000c00, 09:08:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a8001600040a0500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:14 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de000b001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 334.100230][T21944] EXT4-fs (sda1): Unrecognized mount option "debug_want_ext\a_isize=0x0000000000000400" or missing value 09:08:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 09:08:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extr%_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:14 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de000c001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 334.190975][T21946] EXT4-fs (sda1): required extra inode space not available [ 334.208368][T21946] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000c00, 09:08:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xd00}}], [], 0x700}) 09:08:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a8001600040b0500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:14 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de000f001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 334.355650][T21960] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr%_isize=0x0000000000000400" or missing value 09:08:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a8001600040c0500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:14 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0011001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 334.471174][T21967] EXT4-fs (sda1): required extra inode space not available 09:08:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 09:08:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a8001600040d0500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extr\\_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:14 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0012001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xe00}}], [], 0x700}) 09:08:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a8001600040e0500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:14 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0013001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a8001600040f0500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x680840000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:15 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 09:08:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004100500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:15 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0014001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:15 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de003f001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_%size', 0x3d, 0x400}}], [], 0x700}) 09:08:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1100}}], [], 0x700}) 09:08:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004110500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:15 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0040001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004120500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:15 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 09:08:15 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de8847001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:15 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de8848001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004130500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_\\size', 0x3d, 0x400}}], [], 0x700}) 09:08:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1200}}], [], 0x700}) 09:08:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004140500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:15 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de6558001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xb00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:15 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 09:08:15 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0060001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004250500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1f00}}], [], 0x700}) 09:08:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_i#ize', 0x3d, 0x400}}], [], 0x700}) 09:08:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xc00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:16 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de5865001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004480500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xd00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2d00}}], [], 0x700}) 09:08:16 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de007a001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a8001600044c0500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:16 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 09:08:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xe00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_i%ize', 0x3d, 0x400}}], [], 0x700}) 09:08:16 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0081001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004600500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffffffffffff, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3b00}}], [], 0x700}) [ 336.572220][T22114] __nla_validate_parse: 18 callbacks suppressed [ 336.572228][T22114] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:16 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de4788001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:16 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 09:08:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_i*ize', 0x3d, 0x400}}], [], 0x700}) 09:08:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004680500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:16 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de4888001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1100000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 336.802565][T22131] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x4000}}], [], 0x700}) 09:08:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a8001600046c0500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:17 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de00fc001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1200000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 337.007238][T22146] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_i+ize', 0x3d, 0x400}}], [], 0x700}) 09:08:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x685d0100}}], [], 0x700}) 09:08:17 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de00ff001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:17 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 09:08:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004740500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1f00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 337.236004][T22162] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:17 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0002001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_i-ize', 0x3d, 0x400}}], [], 0x700}) 09:08:17 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0003001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a8001600047a0500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6c5e0100}}], [], 0x700}) 09:08:17 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0004001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2500000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 337.485265][T22180] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a8001600047c0500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 09:08:17 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0005001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2d00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_i.ize', 0x3d, 0x400}}], [], 0x700}) [ 337.612314][T22191] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004a50500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:17 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0006001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x330f000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004000600e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 337.736951][T22203] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xc85d0100}}], [], 0x700}) 09:08:17 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0008001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3b00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 337.834380][T22211] validate_nla: 19 callbacks suppressed [ 337.834387][T22211] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 09:08:18 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0009001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:18 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 09:08:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004000700e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_i0ize', 0x3d, 0x400}}], [], 0x700}) 09:08:18 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de000a001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 338.047220][T22227] netlink: 160 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:18 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de000b001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xdc5e0100}}], [], 0x700}) 09:08:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004000900e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3f7ae1697f770000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:18 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de000c001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 338.228259][T22241] netlink: 160 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_iLize', 0x3d, 0x400}}], [], 0x700}) 09:08:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:18 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 09:08:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004000a00e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:18 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de000f001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}, 0x8}], [], 0x700}) 09:08:18 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0010001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 338.444511][T22255] netlink: 160 bytes leftover after parsing attributes in process `syz-executor.0'. 09:08:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004001500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:18 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0011001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004001600e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_iXize', 0x3d, 0x400}}], [], 0x700}) 09:08:18 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0012001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:18 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 09:08:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5c00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 338.687838][T22278] EXT4-fs: 57 callbacks suppressed [ 338.687847][T22278] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize=0x0000000000000400" or missing value 09:08:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004004000e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:18 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0013001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}, 0xa}], [], 0x700}) 09:08:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 338.836127][T22287] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iXize=0x0000000000000400" or missing value 09:08:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a80016000400b000e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:19 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0014001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 338.960340][T22300] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iXize=0x0000000000000400" or missing value 09:08:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004000400e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_i\\ize', 0x3d, 0x400}}], [], 0x700}) 09:08:19 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0060001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 339.070877][T22299] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize=0x0000000000000400 [ 339.070877][T22299] " or missing value 09:08:19 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 09:08:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004000600e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 339.120288][T22312] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 09:08:19 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de007a001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 339.197336][T22314] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i\ize=0x0000000000000400" or missing value [ 339.244950][T22323] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 339.260904][T22319] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize=0x0000000000000400 [ 339.260904][T22319] " or missing value 09:08:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}, 0x2d}], [], 0x700}) 09:08:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:19 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de00fc001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004000700e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 339.356857][T22327] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i\ize=0x0000000000000400" or missing value 09:08:19 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0000031600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_icize', 0x3d, 0x400}}], [], 0x700}) 09:08:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004000900e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:19 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 09:08:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xc000000000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:19 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0000051600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) [ 339.522952][T22337] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize=0x0000000000000400-" or missing value 09:08:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004000a00e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) [ 339.623307][T22344] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_icize=0x0000000000000400" or missing value [ 339.665341][T22348] cgroup: fork rejected by pids controller in /syz2 [ 339.691446][T22355] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize=0x0000000000000400-" or missing value 09:08:19 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0000061600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xebffffff00000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}, 0x3b}], [], 0x700}) 09:08:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004001500e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_idize', 0x3d, 0x400}}], [], 0x700}) 09:08:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 09:08:20 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de0000091600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a800160004001600e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:20 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de00000a1600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a80016000400b000e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xf8f73f0000000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) 09:08:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x8}) 09:08:20 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84136ef75afb83de00000b1600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 09:08:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150002008178a8001600040003a8e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 09:08:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_ihize', 0x3d, 0x400}}], [], 0x700}) [ 340.201971][ T7757] EXT4-fs error (device sda1): ext4_xattr_set_entry:1603: inode #16484: comm syz-executor.0: corrupted xattr entries [ 340.202752][T22393] EXT4-fs error (device sda1): ext4_xattr_ibody_get:591: inode #16488: comm syz-executor.1: corrupted in-inode xattr [ 340.233316][ T7767] EXT4-fs error (device sda1): ext4_xattr_set_entry:1603: inode #16625: comm syz-executor.4: corrupted xattr entries 09:08:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x700}) [ 340.257050][ T7771] EXT4-fs error (device sda1): ext4_xattr_set_entry:1603: inode #16484: comm syz-executor.5: corrupted xattr entries [ 340.270234][T22393] EXT4-fs error (device sda1): ext4_xattr_ibody_get:591: inode #16488: comm syz-executor.1: corrupted in-inode xattr 09:08:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) [ 340.302106][T22393] EXT4-fs error (device sda1): ext4_xattr_ibody_get:591: inode #16488: comm syz-executor.1: corrupted in-inode xattr [ 340.336810][T22393] EXT4-fs error (device sda1): ext4_xattr_set_entry:1603: inode #16484: comm syz-executor.1: corrupted xattr entries 09:08:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000280)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400}}], [], 0x300}) [ 340.364113][T17697] EXT4-fs error (device sda1): ext4_xattr_ibody_get:591: inode #16501: comm syz-executor.2: corrupted in-inode xattr [ 340.381287][T22393] EXT4-fs error (device sda1): ext4_xattr_set_entry:1603: inode #16484: comm syz-executor.1: corrupted xattr entries [ 340.394059][T17697] EXT4-fs error (device sda1): ext4_xattr_ibody_get:591: inode #16501: comm syz-executor.2: corrupted in-inode xattr 09:08:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) [ 341.392322][T21829] ================================================================== [ 341.400667][T21829] BUG: KASAN: use-after-free in ext4_mark_inode_dirty+0x5a5/0x700 [ 341.400694][T21829] Write of size 992 at addr ffff88806b472ea0 by task syz-executor.2/21829 [ 341.400697][T21829] [ 341.400708][T21829] CPU: 0 PID: 21829 Comm: syz-executor.2 Not tainted 5.4.0-rc1 #0 [ 341.400713][T21829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.400717][T21829] Call Trace: [ 341.400730][T21829] dump_stack+0x1d8/0x2f8 [ 341.400744][T21829] print_address_description+0x75/0x5c0 [ 341.400754][T21829] ? vprintk_default+0x28/0x30 [ 341.400765][T21829] ? vprintk_func+0x158/0x170 [ 341.400774][T21829] ? printk+0x62/0x8d [ 341.400788][T21829] __kasan_report+0x14b/0x1c0 [ 341.455259][T21829] ? ext4_mark_inode_dirty+0x5a5/0x700 [ 341.455274][T21829] kasan_report+0x26/0x50 [ 341.478298][T21829] check_memory_region+0x2cf/0x2e0 [ 341.483415][T21829] memset+0x23/0x40 [ 341.487225][T21829] ext4_mark_inode_dirty+0x5a5/0x700 [ 341.492516][T21829] ext4_ext_truncate+0x9d/0x1d0 [ 341.497360][T21829] ext4_truncate+0xac1/0xf70 [ 341.501952][T21829] ext4_evict_inode+0x116e/0x1670 [ 341.506981][T21829] ? ext4_truncate_restart_trans+0xf0/0xf0 [ 341.512775][T21829] evict+0x2a1/0x6c0 [ 341.512789][T21829] ? ext4_free_in_core_inode+0x30/0x30 [ 341.512799][T21829] iput+0x508/0x690 [ 341.512814][T21829] dentry_unlink_inode+0x2e0/0x3d0 [ 341.512829][T21829] __dentry_kill+0x3e2/0x5e0 [ 341.512843][T21829] dput+0x460/0x6f0 [ 341.512856][T21829] path_put+0x39/0x60 [ 341.512867][T21829] exit_fs+0xed/0x150 [ 341.512880][T21829] do_exit+0x59b/0x2190 [ 341.512892][T21829] ? get_signal+0x3aa/0x1d60 [ 341.556070][T21829] do_group_exit+0x15c/0x2b0 [ 341.560663][T21829] get_signal+0x4ac/0x1d60 [ 341.565093][T21829] do_signal+0x37/0x640 [ 341.569243][T21829] ? check_preemption_disabled+0xb7/0x2a0 [ 341.574964][T21829] ? prepare_exit_to_usermode+0x258/0x580 [ 341.580684][T21829] prepare_exit_to_usermode+0x303/0x580 [ 341.586224][T21829] syscall_return_slowpath+0x113/0x4a0 [ 341.586233][T21829] ? __x64_sys_futex+0xe5/0x100 [ 341.586246][T21829] do_syscall_64+0x11f/0x1c0 [ 341.601087][T21829] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 341.606971][T21829] RIP: 0033:0x459a29 [ 341.610864][T21829] Code: Bad RIP value. [ 341.614913][T21829] RSP: 002b:00007f020f011cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 341.623309][T21829] RAX: fffffffffffffe00 RBX: 000000000075bf28 RCX: 0000000000459a29 [ 341.631269][T21829] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000075bf28 [ 341.631276][T21829] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 341.631286][T21829] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000075bf2c [ 341.631291][T21829] R13: 00007ffe88cbdacf R14: 00007f020f0129c0 R15: 000000000075bf2c [ 341.631308][T21829] [ 341.631312][T21829] The buggy address belongs to the page: [ 341.631326][T21829] page:ffffea0001ad1c80 refcount:2 mapcount:0 mapping:ffff888219efdae0 index:0x473 [ 341.631340][T21829] def_blk_aops [ 341.631347][T21829] flags: 0x1fffc000000203a(referenced|dirty|lru|active|private) [ 341.631367][T21829] raw: 01fffc000000203a ffffea0001f93408 ffffea0002002388 ffff888219efdae0 [ 341.665497][T21829] raw: 0000000000000473 ffff888092d14540 00000002ffffffff ffff88805e0546c0 [ 341.665503][T21829] page dumped because: kasan: bad access detected [ 341.665507][T21829] page->mem_cgroup:ffff88805e0546c0 [ 341.665516][T21829] [ 341.699991][T21829] Memory state around the buggy address: [ 341.700002][T21829] ffff88806b472f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 341.700009][T21829] ffff88806b472f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 341.700017][T21829] >ffff88806b473000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 341.752217][T21829] ^ [ 341.756277][T21829] ffff88806b473080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 341.764351][T21829] ffff88806b473100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 341.764355][T21829] ================================================================== [ 341.764358][T21829] Disabling lock debugging due to kernel taint [ 341.791227][T21829] Kernel panic - not syncing: panic_on_warn set ... [ 341.797819][T21829] CPU: 0 PID: 21829 Comm: syz-executor.2 Tainted: G B 5.4.0-rc1 #0 [ 341.807007][T21829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.817044][T21829] Call Trace: [ 341.820336][T21829] dump_stack+0x1d8/0x2f8 [ 341.824656][T21829] panic+0x25c/0x799 [ 341.828541][T21829] ? __kasan_report+0x195/0x1c0 [ 341.833378][T21829] ? trace_hardirqs_on+0x34/0x80 [ 341.838303][T21829] ? __kasan_report+0x195/0x1c0 [ 341.843211][T21829] __kasan_report+0x1bb/0x1c0 [ 341.847870][T21829] ? ext4_mark_inode_dirty+0x5a5/0x700 [ 341.853302][T21829] kasan_report+0x26/0x50 [ 341.857603][T21829] check_memory_region+0x2cf/0x2e0 [ 341.862687][T21829] memset+0x23/0x40 [ 341.866477][T21829] ext4_mark_inode_dirty+0x5a5/0x700 [ 341.871739][T21829] ext4_ext_truncate+0x9d/0x1d0 [ 341.876562][T21829] ext4_truncate+0xac1/0xf70 [ 341.881131][T21829] ext4_evict_inode+0x116e/0x1670 [ 341.886216][T21829] ? ext4_truncate_restart_trans+0xf0/0xf0 [ 341.891995][T21829] evict+0x2a1/0x6c0 [ 341.895875][T21829] ? ext4_free_in_core_inode+0x30/0x30 [ 341.901304][T21829] iput+0x508/0x690 [ 341.905093][T21829] dentry_unlink_inode+0x2e0/0x3d0 [ 341.910186][T21829] __dentry_kill+0x3e2/0x5e0 [ 341.914754][T21829] dput+0x460/0x6f0 [ 341.918543][T21829] path_put+0x39/0x60 [ 341.922499][T21829] exit_fs+0xed/0x150 [ 341.926456][T21829] do_exit+0x59b/0x2190 [ 341.930586][T21829] ? get_signal+0x3aa/0x1d60 [ 341.935150][T21829] do_group_exit+0x15c/0x2b0 [ 341.939712][T21829] get_signal+0x4ac/0x1d60 [ 341.944111][T21829] do_signal+0x37/0x640 [ 341.948250][T21829] ? check_preemption_disabled+0xb7/0x2a0 [ 341.953946][T21829] ? prepare_exit_to_usermode+0x258/0x580 [ 341.959642][T21829] prepare_exit_to_usermode+0x303/0x580 [ 341.965161][T21829] syscall_return_slowpath+0x113/0x4a0 [ 341.970604][T21829] ? __x64_sys_futex+0xe5/0x100 [ 341.975428][T21829] do_syscall_64+0x11f/0x1c0 [ 341.979992][T21829] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 341.985856][T21829] RIP: 0033:0x459a29 [ 341.989730][T21829] Code: Bad RIP value. [ 341.993771][T21829] RSP: 002b:00007f020f011cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 342.002151][T21829] RAX: fffffffffffffe00 RBX: 000000000075bf28 RCX: 0000000000459a29 [ 342.010094][T21829] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000075bf28 [ 342.018048][T21829] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 342.026003][T21829] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000075bf2c [ 342.033948][T21829] R13: 00007ffe88cbdacf R14: 00007f020f0129c0 R15: 000000000075bf2c [ 342.043342][T21829] Kernel Offset: disabled [ 342.048092][T21829] Rebooting in 86400 seconds..