}}], 0x4000000000001b7, 0x0, 0x0) 18:36:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x48000000, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x9) 18:36:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0xae80, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) [ 873.806700] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 18:36:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x0) keyctl$session_to_parent(0x12) 18:36:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x81a0ae8c, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) [ 873.972895] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 18:36:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000000)={0x0, 0x5, 0x2, 0x41, &(0x7f0000ffe000/0x2000)=nil, 0x9}) 18:36:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x700, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x7000000, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) [ 874.324591] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 [ 874.496279] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 18:36:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}}], 0x4000000000001b7, 0x0, 0x0) 18:36:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0xc0189436, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() sched_setaffinity(r2, 0x8, &(0x7f00000000c0)=0xe94) r3 = dup(r0) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000080)={0x1, 0x0, [{0x6000, 0x1e, &(0x7f0000000000)=""/30}]}) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x0) 18:36:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x7a00, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x700, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2d000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:25 executing program 1: syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') lgetxattr(&(0x7f0000000200)='./bus\x00', &(0x7f00000000c0)=@random={'osx.', '\x00'}, &(0x7f0000000100)=""/126, 0x7e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x2, 0x20800) connect$caif(r1, &(0x7f00000001c0), 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x401) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x3f) ftruncate(r2, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000080)={0x0, 0xd, "578fd8505a8872c1a20b5f6bd8"}, &(0x7f0000000240)=0x15) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000280)={r3, 0x3}, 0x8) 18:36:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x541b, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x48, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x8) 18:36:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0x34000}], 0x1, 0x0, 0xffffff98}}], 0x4000000000001b7, 0x0, 0x0) 18:36:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2c, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6b6b6b00000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x0) 18:36:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x40049409, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2c00000000000000, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000080)=@req3={0x2, 0xffffffff, 0x7, 0x1, 0x7, 0x9, 0x7ff}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x0) 18:36:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x2, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:26 executing program 1: socketpair$unix(0x1, 0x100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000000)={0x4, 0x1ff, 0x9, 0x9, 0x80000001, 0x336}) ftruncate(r1, 0x0) 18:36:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x48, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0x2000feae}], 0x1, 0x0, 0xffffff98}}], 0x4000000000001b7, 0x0, 0x0) 18:36:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x1, @local, 0x7}}}, &(0x7f0000000300)=0x84) sendmmsg$inet_sctp(r1, &(0x7f0000000500)=[{&(0x7f0000000000)=@in={0x2, 0x4e20, @remote}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000080)="bed158f111b38d1aae9565edd625bd36c7e7a2acf6000790db1876eeae27487819815a8dbb9d39cb30c31839c1825f6d1b0a0d061cf62ff6d7111a19561966a9b1dbd3a68d65072f7209d892760d99bc0d9c1714f05de0e2a9237a295dcfd0e0c06f4f97e2f38eaf62d3b5033d1da3781a5d119a678a513cacfb6bca4caeec66c3bc89d532362901f33288aa9f8e5188f3348f4521d70793c1320c067c458dab03b963786ee77cac441d941a2e23765ca3a3d0a9168a34f017602837797aaa1888585113b4b3f16004c13c4476b6aa1e121e4129b8b5d9613e5f512d9b2e5df182a8ce5f327edf3c345d", 0xea}, {&(0x7f0000000180)="f727ea0b89ab53e4bf19ce74a4d06a2fc3e261b8740c41a100be9e5fbe813864c85be5e772ff1ad0b09c02ec2c2151a208395450fb", 0x35}], 0x2, 0x0, 0x0, 0x4000}, {&(0x7f0000000200)=@in6={0xa, 0x4e22, 0x7ff, @ipv4={[], [], @loopback}, 0x7f}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000240)="b4fadfae90ddb5b0e0a8ef3ae1019d8ce0a1ba8903cfaf04bd052704f7fa6a9f45ae81a5f997adb4a9b7b2db26bc0b732c2b87ccbbf544ecdfddf9fe0775523adb353d7f65e202f6d526876063294924871ed9b0", 0x54}], 0x1, &(0x7f0000000440)=[@dstaddrv6={0x20, 0x84, 0x8, @mcast2}, @init={0x18, 0x84, 0x0, {0xb8fc, 0xffffffff, 0x8, 0x6}}, @authinfo={0x18, 0x84, 0x6, {0xed}}, @prinfo={0x18, 0x84, 0x5, {0x20, 0x3}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1}, @sndinfo={0x20, 0x84, 0x2, {0x5c, 0x8, 0x54, 0x6, r2}}, @dstaddrv6={0x20, 0x84, 0x8, @mcast1}], 0xc0, 0x4000000}], 0x2, 0x8800) 18:36:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4040ae9e, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x5000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r1 = syz_open_dev$sndpcmp(&(0x7f0000001440)='/dev/snd/pcmC#D#p\x00', 0xc3a5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x600200) open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) preadv(r0, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/161, 0xa1}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000000140)=""/122, 0x7a}, {&(0x7f0000000000)=""/48, 0x30}, {&(0x7f00000001c0)=""/196, 0xc4}, {&(0x7f0000001380)=""/183, 0xb7}], 0x6, 0x0) ftruncate(r1, 0x5) [ 876.591772] EXT4-fs: 5 callbacks suppressed [ 876.591782] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 18:36:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x400) 18:36:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4b47, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2200000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x3000000, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) [ 877.071492] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 [ 877.170049] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 18:36:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0x7ffff000}], 0x1, 0x0, 0xffffff98}}], 0x4000000000001b7, 0x0, 0x0) 18:36:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2200000000000000, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x208200, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x101004}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x1ac, r1, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA={0x104, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffff9}]}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x51c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x999}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xcf04}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xcc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x401}]}, @TIPC_NLA_LINK={0x2c, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xbf}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x512}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}]}]}, 0x1ac}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x104001ff) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) dup(r2) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x745, 0x200) ftruncate(r2, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f00000003c0)={0x73, @multicast2, 0x4e21, 0x0, 'wrr\x00', 0x2, 0x6, 0x4}, 0x2c) 18:36:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae90, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x40000000, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x280881, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x100) ftruncate(r1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) write$P9_RGETATTR(r0, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x1102, {0x0, 0x2, 0x1}, 0x10, r2, r3, 0x5, 0x2605, 0x8, 0x40, 0x4, 0x1, 0x1, 0x9, 0x1, 0x3, 0x3, 0x6, 0x8, 0x0, 0x6}}, 0xa0) socket$bt_cmtp(0x1f, 0x3, 0x5) [ 877.630573] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 18:36:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0xc008ae91, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xe0f000000000000, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) [ 877.784085] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 18:36:28 executing program 1: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x80, 0x0) ioctl$UI_DEV_DESTROY(r1, 0x5502) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x0) ioctl$NBD_CLEAR_QUE(r2, 0xab05) 18:36:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xffffffffffffffff}], 0x1, 0x0, 0xffffff98}}], 0x4000000000001b7, 0x0, 0x0) 18:36:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x5000000, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4c00, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:29 executing program 1: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) fsetxattr(r0, &(0x7f0000000040)=@known='trusted.overlay.impure\x00', &(0x7f0000000080)=',\x00', 0x2, 0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x1) ftruncate(0xffffffffffffffff, 0x0) 18:36:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4b49, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2c00000000000000, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:29 executing program 1: socketpair$unix(0x1, 0x10020000000001, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x0, 0x0) getpeername$netrom(r2, &(0x7f0000000280)={{0x3, @netrom}, [@rose, @netrom, @remote, @bcast, @rose, @netrom, @netrom, @rose]}, &(0x7f0000000300)=0x48) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0xfffffffffffffffe) ftruncate(r1, 0x0) fcntl$setstatus(r0, 0x4, 0x800) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f00000001c0)={0x0, 0x0, 0x20}, &(0x7f0000000200)=0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r2, 0x80045700, &(0x7f0000000380)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000080)={r4, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xa}}}, 0x5, 0x2b, 0x2, 0x100000000, 0x5f8d}, &(0x7f0000000000)=0x98) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={r5}, &(0x7f0000000180)=0x8) ioctl$EVIOCGBITSND(r3, 0x80404532, &(0x7f00000003c0)=""/126) 18:36:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x22, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) [ 878.530446] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 18:36:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0xc0045878, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x0) 18:36:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x6b6b6b, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) [ 878.741207] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 18:36:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0xffffff1f, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffdfd, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:30 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x0) 18:36:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x2, 0x0, 0xffffff98}}], 0x4000000000001b7, 0x0, 0x0) 18:36:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x300, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6800, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:30 executing program 1: socketpair$unix(0x1, 0x2000000100000008, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) socketpair(0x1d, 0x1, 0x3f71, &(0x7f0000000000)) ftruncate(r1, 0x0) 18:36:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x50, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffdfc, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000080)="6d89fad6d487da1bfe588246776c51401243d8b9a11378221cf1e483d82eb96f6fd5c3f30e850622e2e91f9d7cce57fa8790f38e7dc9ee7e01689aad47447f4208289b2aa344b607e0da8bf8a927d17bfda2b1451ae75dba4b2f9d04071de28bcb23f73dc935382209d211832e07a40f33ea81993bf785c803ffe067bfbaa1c3ba7bc65fe2cca83d5ca1de17788ee51ea4533f47d653534e4de5fa1585fc1051816c788ffe6f62afd38489841e057be2e9f6fd586179e882f8") ftruncate(r1, 0x0) 18:36:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x8, 0x0, 0xffffff98}}], 0x4000000000001b7, 0x0, 0x0) 18:36:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0xc, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x0) 18:36:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x40000001, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2d, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x0) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 18:36:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x9000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x2, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xe0f000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x7a, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x34, 0x0, 0xffffff98}}], 0x4000000000001b7, 0x0, 0x0) 18:36:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4c, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x3, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4c, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf0e, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)={0x1, 0x1, [@broadcast]}) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xc67, 0x2000) 18:36:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0xa, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf0e, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x68000000, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x5, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1b7, 0x0, 0xffffff98}}], 0x4000000000001b7, 0x0, 0x0) 18:36:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x18c21d, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x5, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x400000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x74000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x7, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:33 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x0) 18:36:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2200, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x5000000, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x10, 0x0, 0xffffff98}}], 0x4000000000001b7, 0x0, 0x0) 18:36:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x80000008, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2c000000, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0xd, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:34 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000700)='./bus\x00', 0x14103e, 0x800000000000) pwritev(r0, &(0x7f0000000640)=[{&(0x7f0000000000)="d4d862b27cc27117b8747f91b91e81b02ae8531249e494e3ffcd67b7a8482197ba357c8a26896d22fcff2c457d73e4d2d12633", 0x33}, {&(0x7f0000000080)="60bded8990d2f62ad33181af24e18c0c52067d0cb4fe113f58cd48931e94a417ccbdd03f6870e95784bd38a2669aba1e5e400dadc9e3c3ec9e8bb3b65866085e00cbcb39796ed4c792c944f414344a3a20e0b2613f33527028ab43b0db54af22aa66797450a87ebd6689e5d149b144b0f7ae30f4e168b81e6bfb3db4a385a3efa968a96b1c5d4f96ae4be04409e8f6bd229bc72806a33c6c376477465956566c99688cdfff4f65c9c7334682c6f67bd5d3d809866d6db7b4bd33c59192137afda560c53328aa261d9a7611a6017d1c5753a56dd68fab3fcff0675abbb99ceb7a8ffb6a7206f74c309bba289c1c4b2c7282125b08", 0xf4}, {&(0x7f0000000180)="de343fbb4671c531e0f7f71cd2d4b41f98723c54179da097f807a496a62aa44a1946c4150487539afc7c27c9711b3a04332142ece50feceb9f9f5db15fbd315f6859ed57e5e9ab19fc2786dc37510e9acbcc7817ab607f38845ca37d115460cc8e13c26748fb3216d60544d8f02a746b747afabdc7dfe3f9be5695e812af472d46c1656a4c900452086a72758f", 0x8d}, {&(0x7f0000000240)="f67b0dd9552d316bc193fda8f0416fb09d", 0x11}, {&(0x7f0000000280)="f6c905f8473e8e1457277606eb40bceefc645fd139559065e5417837e7c2e5301516de3956710819771fab4b4eb3d6dea70055d79970e683a5b7d6c67d2ef3d94612af94f55d", 0x46}, {&(0x7f0000000380)="2676b88319ac0d6fc926f8bd575233d4f3889178d33c59354d2aaf4debf0a4c02400e6ae60da94577fb1f65a25e3cba27f3b7a6f1396a64df5164c894a3dfa229021a57c4c1a9d78b704150c13359c4803d55886e44b2a3ff859d180839f2a1916657980ff1322d4701034871f2386097dce827e9d9d9f4bf0187499414a2c0ee34b8a9fbf94728c29883e68dc83518cef3cb4c442c28ddb5b84fbc67c26d55082999fb204f908d0e64b22b14978203f739a9aaf822ec432bb35906b8d5f37215f153743", 0xc4}, {&(0x7f0000000480)="5a2b133f1827f1f0538b79e72e97846dc95013827ca0cf04b58dc0369e71a8b679c65b8e3005a1fdfae0d8c9b649f18b822ca344810219529f03066c74c90f38e22e096db691249bc06862e3efe890f267c520929225e4323323585258ab1abe1f2bc8008225f576122edcb5a4e2256b276af9af9bbaea17f44ca55814e5253ca7cb116ea02eb813", 0x88}, {&(0x7f0000000540)="f095e3a6d65715a37fa5077ea7a3404f05f4410de7478b24cb5392dfa8d1cda343aebfba5a949aa1f02c7e3cf65abd9d66f4bbf2b53deb88117b3dd8f157b22e64d064d599fadfc485ba90a5f46cc6f470d5062ea89dc747249a232e869282e101f99f5cdff27b0047493826b0714d0d65662899d924b2f4baec0f0a708b822ba44a06ce71848c42ea455d00e21bc8f6ee6228544b4dac49d2d81288e1b4fdbb06f704dbf5477d1963f9a37a31d4a7f1ce45c42346b8b39865d77faa0a930fb4a451090f0601e82750ac45a57cc237", 0xcf}, {&(0x7f0000000300)}], 0x9, 0x0) ftruncate(r1, 0x0) 18:36:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x7400, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x8dffffff}}], 0x4000000000001b7, 0x0, 0x0) 18:36:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x500, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x500, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x1f) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f0000000000)) 18:36:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x700, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x3f00}}], 0x4000000000001b7, 0x0, 0x0) 18:36:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x400000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0xffff8000, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x900, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x9000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x100000000000000, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000080)={0x0, 0x41, "1f7b5421316ea0f699c7a83a4d479cf7fb62000dc2304f02b087676dbe2f2e40cf8c0304c8e4ca3d268dfc363c1853d60ccb63df785a9b0dcbabc6c8ae8cd2577c"}, &(0x7f0000000000)=0x49) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000100)={r3, 0x3f}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x0) 18:36:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x7}}], 0x4000000000001b7, 0x0, 0x0) 18:36:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffdfc, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2d, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6b6b6b00000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0xfdfdffff00000000, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1f00, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6b6b6b00, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x600, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x2, &(0x7f0000000000)={0x80000001}, 0x0, 0x8) r2 = geteuid() fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$erofs(&(0x7f0000000080)='erofs\x00', &(0x7f00000000c0)='./bus/file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000100)="31152740789e35f9073c1e9ce6a71a9fdd6a4914f9b727405734e2f9b1bdf555f62f8d96241388394c6e8730735a0643fa10c0c49539d4de93d53787ec9640a19b59c41698f0aea8e49ce4763b9a3458dbc010a086bb2a6e77f37e2a73f3eeba6ffd72bd97adba4acea9", 0x6a, 0x5}], 0x1000, &(0x7f0000000240)={[{@acl='acl'}], [{@pcr={'pcr', 0x3d, 0x2b}}, {@obj_role={'obj_role', 0x3d, '$ð0'}}, {@dont_hash='dont_hash'}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@dont_hash='dont_hash'}, {@uid_gt={'uid>', r2}}, {@fowner_gt={'fowner>', r3}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000300)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f00000003c0)={0x7, 0x8, 0xfa00, {r5, 0x2}}, 0x10) 18:36:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x1000000000000000}}], 0x4000000000001b7, 0x0, 0x0) 18:36:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0xffffffff00000000, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2200, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2d00000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x5, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x600, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2c00, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x4000}) 18:36:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x22, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0xf0ffffff}}], 0x4000000000001b7, 0x0, 0x0) 18:36:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x68000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x2000000, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:38 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:38 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x0) 18:36:38 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xe0f, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x48000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0xfdfdffff, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2) 18:36:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) [ 888.240322] device bridge_slave_1 left promiscuous mode [ 888.246117] bridge0: port 2(bridge_slave_1) entered disabled state [ 888.304176] device bridge_slave_0 left promiscuous mode [ 888.310310] bridge0: port 1(bridge_slave_0) entered disabled state 18:36:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x8}}], 0x4000000000001b7, 0x0, 0x0) 18:36:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffdfc, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffdfd, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x2, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:39 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x7d, &(0x7f00000001c0)={0xff0f}, &(0x7f0000000200)=0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x0) 18:36:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1f000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0xfffffdfd, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x3f000000}}], 0x4000000000001b7, 0x0, 0x0) 18:36:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2c00, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2d00000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x80ffff00000000, [{0x1, 0x0, 0x0, 0x7fffffff}]}) [ 900.476680] device hsr_slave_1 left promiscuous mode [ 900.532648] device hsr_slave_0 left promiscuous mode [ 900.610864] team0 (unregistering): Port device team_slave_1 removed [ 900.634215] team0 (unregistering): Port device team_slave_0 removed [ 900.661594] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 900.741322] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 900.942201] bond0 (unregistering): Released all slaves 18:36:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001480)={{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001580)=0xe8) fstat(r0, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001640)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000001740)=0xe8) fstat(r1, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001800)={{{@in=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@initdev}}, &(0x7f0000001900)=0xe8) r7 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001940)={{{@in=@multicast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000001a40)=0xe8) stat(&(0x7f0000001a80)='./bus\x00', &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000001b40)=0x0, &(0x7f0000001b80), &(0x7f0000001bc0)) stat(&(0x7f0000001c00)='./bus\x00', &(0x7f0000001c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000001400)='./file0\x00', &(0x7f0000001440)='system.posix_acl_default\x00', &(0x7f0000001cc0)={{}, {0x1, 0x6}, [{0x2, 0x1, r2}, {0x2, 0x6, r3}, {0x2, 0x1, r4}, {0x2, 0x1, r5}, {0x2, 0x6, r6}, {0x2, 0x0, r7}, {0x2, 0x7, r8}], {0x4, 0x1}, [{0x8, 0x2, r9}, {0x8, 0x4, r10}, {0x8, 0x5, r11}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r12 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) r13 = getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r12, 0x29, 0x22, &(0x7f0000000180)={{{@in=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@initdev}}, &(0x7f0000000280)=0xe8) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$security_evm(&(0x7f0000001d80)='./file1\x00', &(0x7f0000001dc0)='security.evm\x00', &(0x7f0000001e00)=@ng={0x4, 0x5, "cfcd50402b180822869c742e6d"}, 0xf, 0x1) write$P9_RLOCK(r12, &(0x7f0000001d40)={0x8, 0x35, 0x2}, 0x8) sendmsg$unix(r1, &(0x7f00000013c0)={&(0x7f0000000080)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000380)="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", 0x1000}, {&(0x7f0000000100)="9baf0b222cffbd46e7ee3dc672916465559f929103121be818e88581d9e0df209d31b775eb4704680bfefd962385a1a7351fd17ac42c10efd47a3cecc9c114f1732363baad9a3a363887674e3073cbfe", 0x50}], 0x2, &(0x7f0000001380)=[@cred={0x20, 0x1, 0x2, r13, r14, r15}], 0x20, 0x4000000}, 0x4000) ftruncate(r12, 0x0) 18:36:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2d00, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x200000000000000, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x700000000000000}}], 0x4000000000001b7, 0x0, 0x0) 18:36:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4c00, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4c00, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x1000000, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:52 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f00000000c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$setperm(0x5, r2, 0xffffffff) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x0) 18:36:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x700, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1f00000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='schedstat\x00') ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000000c0)=0x63e55b74) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) getpeername$ax25(r2, &(0x7f0000000100)={{0x3, @default}, [@null, @rose, @bcast, @default, @netrom, @remote, @bcast, @bcast]}, &(0x7f0000000000)) ftruncate(r2, 0x0) 18:36:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6800, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x5000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x7000000}}], 0x4000000000001b7, 0x0, 0x0) 18:36:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x80ffff, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:36:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x400000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000080)={0x3f8000000, 0x0, {0x3, 0x0, 0x976, 0x0, 0x42541932}}) ftruncate(r1, 0x0) 18:36:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf0e, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x68000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x500, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x8, 0x402000) r2 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x7, 0x200) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, &(0x7f0000000080)=""/146) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x0) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f0000000180)) 18:36:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0xffffff1f, 0x0, 0x0, 0x7fffffff}]}) 18:36:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x100) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000080)=0x5, 0x4) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x0) 18:36:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x680e}}], 0x4000000000001b7, 0x0, 0x0) 18:36:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x60, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000000)=0x7f, 0x8) ftruncate(r1, 0x0) 18:36:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x500, 0x0, 0x0, 0x7fffffff}]}) 18:36:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f00000000c0), 0x4) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000), 0x4) 18:36:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1f000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x2, 0x0, 0x0, 0x7fffffff}]}) 18:36:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x10}}], 0x4000000000001b7, 0x0, 0x0) 18:36:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2c000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x5000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb0100180000000000000094000000ac000000020000003084a31a87038ff654ad808941d015858b73e2edff80e551ad81867586f43c09bf63c088e74dc268abd7811267f7c5cde5424d713ab26f5abdf9aabaa8eb3853ae503dcdae246094aa21f7bebdc7471881f31c29aafd600a29fbbe0a347281bb55b36105d7250fc02ee01444c3723177f5c4b1f8105f7258c5d6466a9055d812e835c864a622122588a55ba5b3d9291266f138ac00132a93b66036666c4c32a6dfd31969bcfca11f021955a0a39380f9302abaf3594d801e5cebe86edeb82668b781de50206f4570f93dc5a3207900"], &(0x7f00000001c0)=""/165, 0xe7, 0xa5}, 0x20) r1 = syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x1000, 0x141002) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000500)={0xc46, 0x2fa1, 0x1}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000480)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000400)="475bdb2b31a0c96ad25b87d6b89ddcd3451afb1846d07b6513ae6171de84742681a415bfaacb83d908c6475d6e265c826f1ca16490e738a7470f3efbb1fe8f54e762e1808dfed10d5489a12ef034db5ac1", 0x51, r1}, 0x68) r2 = fcntl$getown(r0, 0x9) sched_getattr(r2, &(0x7f0000000000), 0x30, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x81) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0x1f, 0xfffffffffffffff8, 0x0, 0x8001, 0x0, 0x2, 0x50120, 0xd, 0x4, 0x400, 0xf355cec, 0xfffffffffffff801, 0x0, 0x1, 0x6, 0x5, 0x80, 0x8, 0x7, 0x3, 0x10001, 0x8, 0x4, 0x3, 0x9, 0x7, 0x8, 0x10000, 0x80, 0x3, 0xfffffffffffffffc, 0x4, 0x101, 0x80, 0x1, 0x3, 0x0, 0x6, 0x1, @perf_config_ext={0x4, 0x9}, 0x120, 0xfffffffffffffffd, 0x4, 0x2, 0x6, 0x7fff, 0x3}, r2, 0xc, r1, 0x3) ftruncate(r3, 0x0) 18:36:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x18c21d, 0x0, 0x0, 0x7fffffff}]}) 18:36:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2c000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80000, 0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x7) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x6, 0x4) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x0) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000080)={0x0, 0x6e, "e61635229c49a15c20395fd4b9e8e92af0c49474ae08118d932689ae7772650db11a8afd4e781d415aaeb4ccfbb805cf49af5dc43001e150a6b12be6085e6dba36578dd67a3882a6b830857bddcaea748e94a3d8cc7e4b1057c90ff9ebed457bd0ea24fa0fcbf4a8593a4e736ada"}, &(0x7f0000000100)=0x76) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000140)={r3, 0x8}, &(0x7f0000000180)=0x8) 18:36:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4800, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6c, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x8dffffff00000000}}], 0x4000000000001b7, 0x0, 0x0) 18:36:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x7, 0x0, 0x0, 0x7fffffff}]}) 18:36:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffdfd, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:55 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r0, 0x0, 0x1, &(0x7f00000002c0)='\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x3f, 0x1, 0xfe, 0x8, 0x0, 0x8001, 0x1, 0x8, 0xce, 0x0, 0x40, 0x0, 0x9, 0x6, 0x1, 0xd7, 0x4, 0xfffffffffffffffa, 0x400, 0x7, 0x81, 0x10000, 0x2, 0x81, 0x0, 0xfffffffffffffc00, 0x7, 0x1, 0x800, 0x4, 0xfffffffffffffff9, 0x0, 0x10000, 0x101, 0x81, 0x426c, 0x0, 0x6, 0x6, @perf_config_ext={0x2, 0x9}, 0x3001, 0xfffffffffffffffd, 0x3, 0x8, 0xfffffffffffffa80, 0x6, 0x3}, r2, 0xffffffffffffffff, r0, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000080)) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x3, 0x0) r4 = semget$private(0x0, 0x2, 0x200) openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x0, 0x0) setsockopt$rose(r0, 0x104, 0x7, &(0x7f0000000200)=0x1, 0x4) semctl$GETZCNT(r4, 0x3, 0xf, &(0x7f0000000100)=""/193) 18:36:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x22, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)) ftruncate(r0, 0x4) 18:36:56 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x3, 0x0, 0x0, 0x7fffffff}]}) 18:36:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2d000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x800000000000000}}], 0x4000000000001b7, 0x0, 0x0) 18:36:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0xdb10, 0x8, 0x3}) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x0) 18:36:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xe0f0000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:56 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x80000008, 0x0, 0x0, 0x7fffffff}]}) 18:36:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfcfdffff00000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7400, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:57 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000080)={0x0, 0x80000}) syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x6, 0x420c00) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000180)={0x98, 0xc, 0x4, 0x4000100, {}, {0x4, 0x0, 0x480000000000, 0x101, 0xdd, 0x100000000, "6eea20e0"}, 0x10001, 0x6, @userptr=0xff, 0x4}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000140)={r2, 0x0, r1}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x0) 18:36:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x50, 0x0, 0x0, 0x7fffffff}]}) 18:36:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1f00, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x4000}}], 0x4000000000001b7, 0x0, 0x0) 18:36:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1f000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000240)={0x2, &(0x7f0000000200)=[{}, {0x0}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r2, 0x40086424, &(0x7f0000000280)={r3}) r4 = dup3(r1, r1, 0x80000) ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f0000000180)={0x100000001, 0x0, 0x10001, 0xfb}) ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f00000001c0)={0x1ff, r5, 0x0, 0x5b}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r6 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x2) ioctl$KDADDIO(r4, 0x4b34, 0x81) getsockopt$IPT_SO_GET_INFO(r4, 0x0, 0x40, &(0x7f0000000080)={'security\x00'}, &(0x7f0000000000)=0x54) r7 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r7, 0xc0086420, &(0x7f0000000140)) 18:36:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x300, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0xa, 0x0, 0x0, 0x7fffffff}]}) 18:36:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2200, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xe0f0000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:57 executing program 1: socketpair$unix(0x1, 0x800000002, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7) 18:36:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0xd, 0x0, 0x0, 0x7fffffff}]}) 18:36:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x10000000}}], 0x4000000000001b7, 0x0, 0x0) 18:36:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4800, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:58 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x40000, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001640)={{{@in6=@mcast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000300)=0xe8) lstat(&(0x7f0000001740)='./bus\x00', &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f00000000c0)='./bus\x00', 0x1, 0x6, &(0x7f0000001580)=[{&(0x7f0000000100)="9c3fab637302ee6ebf0a56ed3072f31a2911109fe218c8ff80f88763adee6d1cd8cd7beaad127394683ac8af0c5a5f2a6517471f5e283ce499925148cf434e2b5f1af80a1d2f4c78410ea2fb3467e627e65c95598730fab3eb2e42dfa811de459a13487f50b341b3d32ac5e566215da1b3c43cca8aa4d9658314b95958c98fea440a08ebf99b83be1737e95df18a8122de01684fa1d6ead334e98032faa5abc7ac162e3f442e1a351a9b640d9df9b052f034c054af6ed3c75de7a5a8026a87e70534be3d7c35e4dd5097d45afb0e53d2daaa6a76b29b4687b0adffd3a020c6a0a9267596c99248ed7a", 0xe9, 0x1}, {&(0x7f0000000200)="fdf275e357b113d6646f24e0d3990aa9957d46938d02f7e0cc793dd3f42a297461eee22dcc1eb51e10e3ffeeb4566f3539a6709ef8458184f948e4491b8d836177856fa835cace6ec121237a1edec35d22e1684365cdde7349161995f16b682363d6e8f9afbf1e2cf0f47d5f3df56cd928e58b85ece6e4a63ab8a8afce", 0x7d, 0x40}, {&(0x7f0000000280)="9594ed6ba1e80e74eee721b5b9161a19e29e25f9e131fa8ac044a780d663db98d69fb02cf2a7a7c1ffb56cc793193fe201bda32b0815eddd063f998c6fe54ac01ae2061ad8312ab1a52e718c", 0x4c}, {&(0x7f0000000380)="203665a15fec1fdbd70ba2556a1fe4173f595fb7a3ad2565792e401c8354b4d81403e2206b305cdbb352e6643968e11415c72c012da58dd1c9f29c7745d506aa1fa67fc9bea52f8c7210c4f7d904b479907fbb8426c6c8574beb3923c47e79a667df32668a83cac6ca48958511207325ba32ce4f6438cf2ff6ce4cd0c2e7025d340a9ca4cd4e3da5843f4e7f26cb9e24aee938e5345504630e3a5cfc9e2ede3646e1aed2300f96eb39846d9db5e6659fc21c559e3c1bcbd8661d40e861e1feceb61aad436d9e53fe68d5173e57fd7b307741b07448b5205ea08bf4922810", 0xde, 0x9}, {&(0x7f0000000480)="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", 0x1000, 0xfffffffffffeffff}, {&(0x7f0000001480)="d4f4fbe918e466f71f2bb9439b3f49f9dd6c7f78a2a8695793e2c3f9ed294b61b966216b8ba72e66a4a113c55e0387984f0dec2dba06cb255854b4f70b83fc993f21d075f402791524b424fd60e8d49799dbd654d6e64563990812e66653ab0cd99d759103e4503171180e5cd991a5dba5fea3494f4a6c0cc6b4e4713272ac22f64bbfaf12e6511a881b9c796d1d87c53bcf85ca649ffec4cfe2617bafca7569d0d345ed5fff6d869f3cf255343a32ac3e6dbe46482beefb0858b9b1f4238c6d93501612eaa3d403dc46", 0xca, 0xf389}], 0x8, &(0x7f0000001800)={[{@session={'session', 0x3d, 0x2}}, {@umask={'umask', 0x3d, 0x745}}, {@part={'part'}}, {@nodecompose='nodecompose'}, {@nodecompose='nodecompose'}], [{@obj_user={'obj_user'}}, {@pcr={'pcr', 0x3d, 0x1f}}, {@uid_eq={'uid', 0x3d, r2}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/ppp\x00'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r3}}, {@dont_measure='dont_measure'}]}) ftruncate(r1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000001900)={r1, r1}) 18:36:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2200000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffdfc, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x40000001, 0x0, 0x0, 0x7fffffff}]}) 18:36:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:58 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r0, r0, &(0x7f0000000080), 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400201) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x0) 18:36:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10002f, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x10000, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000001c0)=0x0) sendmsg$nl_netfilter(r2, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x6c, 0xa, 0xf, 0x21, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x2}, [@typed={0x8, 0x64, @fd=r1}, @typed={0x8, 0x7, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @typed={0x14, 0x96, @ipv6=@loopback}, @nested={0x10, 0x36, [@generic="66e7b6b26c9bf87c25"]}, @typed={0x8, 0x8c, @pid=r3}, @typed={0x1c, 0xe, @str='/selinux/avc/hash_stats\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x40000}, 0x840) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$CAPI_GET_ERRCODE(r4, 0x80024321, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000300)={@dev, @remote, 0x0}, &(0x7f0000000380)=0xc) setsockopt$packet_drop_memb(r4, 0x107, 0x2, &(0x7f00000003c0)={r6, 0x1, 0x6, @broadcast}, 0x10) mq_getsetattr(r5, &(0x7f00000000c0)={0x8, 0xffffffffffffffe1, 0x7, 0x9, 0x9, 0xc36, 0x5, 0x3fffffff80}, &(0x7f0000000100)) 18:36:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x1000000}}], 0x4000000000001b7, 0x0, 0x0) 18:36:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0xffffffff00000000, 0x0, 0x7fffffff}]}) 18:36:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xe0f, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/checkreqprot\x00', 0x101840, 0x0) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000640)=0x1000, &(0x7f0000000680)=0x4) ftruncate(0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x5, 0x30, 0x2c3df89d, 0x101}, &(0x7f0000000080)=0x18) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000140)=ANY=[@ANYRES32=r2, @ANYBLOB="7ebe845d20ba0b05079af92ba5f8268c36f68c84e0aa0144b0568b6ddd706a1788d46806ca15fa773db7c406b375655ffca4e3a074afcf7144d12911088ebadfabc71975850b4e0bc4aff37b11a84af927d2b9af0d51deb64c26c5436648ac6898607cae56"], 0x12) 18:36:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000fe, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:36:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:36:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfcfdffff, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:36:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x800, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) fanotify_mark(r1, 0x8, 0x40000001, r2, &(0x7f00000000c0)='./file0\x00') r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x0) 18:36:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x1000000, 0x0, 0x7fffffff}]}) 18:36:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x1) 18:36:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10fffe, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0xfffffff0}}], 0x4000000000001b7, 0x0, 0x0) 18:37:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6b6b6b00000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6b6b6b00, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x4080) ioctl$SIOCX25SCALLUSERDATA(r1, 0x89e5, &(0x7f0000000100)={0x71, "856882481fe4dd6dba8b1455c47d8fc6000c8bd9423dff2bdee434c16e1b9bcd77b28021c295544ac07d7380814f3fa0591b9e5b8f267e79d0ff3f87d5a2c3921f2bca508f608a43ee807be301c572aed5b528fd0c173ad7044776af05b8a4e918a87171e3e87ee8988a14c0f36b82c6b2dc44e1115d19afde6250842bd3153c"}) sendmmsg$unix(r1, &(0x7f0000000300)=[{&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f00000002c0)=[{&(0x7f00000001c0)="9f0ff3d7680360ffea870a53357f909b322e662400eaf2b714eeb72572bf5d99a34ebbd317f107c41f8f746c632af815a48a23d653cfcc453c6fca71bed2a379023b1395c7d8ed42537a0e386d5f0b76357b816dade1a79efce1746b454995f9e49550f156e1116677e9b3d4e03d07b007200c56d9e91e02e2cf58afe854d83183e03f09936c81a399cff4d9ea6e4ceb8c3e4c8fb2053fada48db06e19", 0x9d}, {&(0x7f0000000280)="622979dc8686ccaa4e534c857e13305c43b4c8db6fb7", 0x16}], 0x2}], 0x1, 0x20000801) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x0) 18:37:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0xfdfdffff, 0x0, 0x7fffffff}]}) 18:37:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100025, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xe0f000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x80200, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000080)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x0) 18:37:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10002d, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x2, 0x0, 0x7fffffff}]}) 18:37:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0xf0ffffff00000000}}], 0x4000000000001b7, 0x0, 0x0) 18:37:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup2(r0, r1) ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f0000000000)=0x40) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4) ftruncate(r3, 0x0) write$P9_RCREATE(r2, &(0x7f0000000080)={0x18, 0x73, 0x1, {{0x21, 0x3, 0x7}, 0x2}}, 0x18) 18:37:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1f00, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0xfdfdffff00000000, 0x0, 0x7fffffff}]}) 18:37:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={',node_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) [ 910.528049] EXT4-fs (sda1): Unrecognized mount option "node_readahead_blks=0xffffffffffffffff" or missing value 18:37:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x900, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x3, 0x2) getsockopt$inet_tcp_int(r1, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x0) 18:37:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x200000000000000, 0x0, 0x7fffffff}]}) 18:37:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x300, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) [ 910.714675] EXT4-fs (sda1): Unrecognized mount option "node_readahead_blks=0xffffffffffffffff" or missing value 18:37:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x6) 18:37:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x8000000}}], 0x4000000000001b7, 0x0, 0x0) 18:37:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\"node_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:02 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f00000008c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000300400002801000000000000980200000000000028010000980300009803000098030000980300009803000004000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="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"], 0x490) ftruncate(r0, 0x400) 18:37:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x80ffff00000000, 0x0, 0x7fffffff}]}) [ 911.492117] EXT4-fs (sda1): Unrecognized mount option ""node_readahead_blks=0xffffffffffffffff" or missing value 18:37:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x48, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2d, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:02 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x8) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x0) 18:37:02 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x200, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000100)={0xffffffffffffff7f, 0x0, 0x0, 0x7}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000140)={0x40, r2, 0x10001, 0x4}) creat(&(0x7f0000000000)='./bus\x00', 0x100) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioctl$sock_netrom_SIOCDELRT(r3, 0x890c, &(0x7f00000001c0)={0x1, @bcast, @bpq0='bpq0\x00', 0x6, 'syz0\x00', @null, 0x8, 0x7, [@bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) ioctl$VT_GETMODE(r3, 0x5601, &(0x7f0000000080)) ftruncate(r3, 0x0) [ 911.644996] EXT4-fs (sda1): Unrecognized mount option ""node_readahead_blks=0xffffffffffffffff" or missing value 18:37:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x100000000000000, 0x0, 0x7fffffff}]}) 18:37:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'i\"ode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) [ 911.938392] EXT4-fs (sda1): Unrecognized mount option "i"ode_readahead_blks=0xffffffffffffffff" or missing value [ 912.057947] EXT4-fs (sda1): Unrecognized mount option "i"ode_readahead_blks=0xffffffffffffffff" or missing value 18:37:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x700}}], 0x4000000000001b7, 0x0, 0x0) 18:37:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xe0f000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:03 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) fcntl$getown(r0, 0x9) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x0, 0x2) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000140)={0x3, 0x7, 0x5, 0x0, 0x9000000000000, 0xfff, 0x80000000, 0x67f, 0xfffffffffffffee6, 0xfff, 0x1}, 0xb) socket$can_bcm(0x1d, 0x2, 0x2) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xef, 0x800) fcntl$getownex(r3, 0x10, &(0x7f00000000c0)) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x109001, 0x0) ftruncate(r3, 0x0) 18:37:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x80ffff, 0x0, 0x7fffffff}]}) 18:37:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'i,ode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2c00000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:03 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000180)="0a5c1f023c126285719070") mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000) ftruncate(r1, 0x0) [ 912.481518] EXT4-fs (sda1): Unrecognized mount option "i" or missing value 18:37:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x2000000, 0x0, 0x7fffffff}]}) [ 912.595178] EXT4-fs (sda1): Unrecognized mount option "i" or missing value 18:37:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfcfdffff, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x4000000000000000}}], 0x4000000000001b7, 0x0, 0x0) 18:37:04 executing program 1: socketpair$unix(0x1, 0xa, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x0) getsockopt$llc_int(r1, 0x10c, 0xc, &(0x7f0000000000), &(0x7f0000000080)=0x4) 18:37:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'in\"de_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0xffff8000, 0x0, 0x7fffffff}]}) [ 913.392012] EXT4-fs (sda1): Unrecognized mount option "in"de_readahead_blks=0xffffffffffffffff" or missing value 18:37:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x48000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2d00, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0xfffffdfd, 0x0, 0x7fffffff}]}) 18:37:04 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000280)=0x1, &(0x7f0000000300)=0x2) accept4$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x0, 0x80800) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000100)}}], 0x3b2, 0x0) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000001180)=0x1, 0x4) ioctl$VIDIOC_TRY_FMT(r3, 0xc0d05640, &(0x7f0000000100)={0x0, @sliced={0xffffffff, [0x3ff, 0x101, 0x3, 0x0, 0x9, 0x20, 0x40bb, 0x1, 0xb0dd, 0xffffffff, 0x5, 0x2, 0x80000001, 0x4, 0x0, 0x1, 0xffff, 0x0, 0x2, 0x9, 0x0, 0x0, 0xffff, 0x7, 0x1ff, 0x1, 0x7, 0xd2b, 0x0, 0x9, 0x7fffffff, 0x7fffffff, 0x1, 0x1e, 0x7, 0x0, 0x9, 0x0, 0x1, 0x101, 0x4, 0x7fff, 0x1, 0x895c, 0x4, 0x6, 0x6, 0x4], 0x2}}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000004c0)=@sack_info={0x0, 0x7d, 0x8000}, &(0x7f0000000500)=0xc) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x42001, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000540)={r4, 0x40}, 0x8) munlockall() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpu.stat\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400201) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) r7 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) dup(r5) ftruncate(r7, 0x0) [ 913.542109] EXT4-fs (sda1): Unrecognized mount option "in"de_readahead_blks=0xffffffffffffffff" or missing value 18:37:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x100000}}], 0x4000000000001b7, 0x0, 0x0) 18:37:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'in%de_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x74000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:05 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0xb9) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) clone(0x2000003102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, 0x0) open$dir(&(0x7f00000000c0)='./file1\x00', 0x141040, 0x0) open$dir(&(0x7f0000000300)='./file0\x00', 0x841, 0x0) 18:37:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0xffff8000, 0x7fffffff}]}) 18:37:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x2, 0x7fffffff}]}) 18:37:05 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000014000/0x18000)=nil, &(0x7f0000000300)=[@textreal={0x8, &(0x7f0000000000)="360fae08670f01d1b8c80e8ee0f2a566b9af0300000f320fc75ac70f019af5ffba210066ed0fc79e9c5ebaa000b80118ef", 0x31}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:37:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'in,de_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) [ 914.823678] *** Guest State *** [ 914.827317] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 914.840057] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 914.849140] CR3 = 0x0000000000000000 [ 914.853166] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 [ 914.859499] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 914.865753] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 914.872835] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 914.881146] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 914.891651] SS: sel=0x0000, attr=0x00081, limit=0x0000ffff, base=0x0000000000000000 [ 914.904162] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 914.912539] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 914.921031] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 914.929601] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 914.937896] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 914.946267] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 914.955033] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 914.979792] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 915.009507] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 915.029404] Interruptibility = 00000000 ActivityState = 00000000 [ 915.042773] *** Host State *** [ 915.051752] RIP = 0xffffffff811fd350 RSP = 0xffff88804ffbf3f0 [ 915.070281] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 915.084791] FSBase=00007f3478806700 GSBase=ffff8880ae600000 TRBase=fffffe0000003000 [ 915.097830] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 915.104484] CR0=0000000080050033 CR3=00000000991cd000 CR4=00000000001426f0 [ 915.112229] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 915.119428] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 915.125801] *** Control State *** [ 915.130164] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca 18:37:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x40000000}}], 0x4000000000001b7, 0x0, 0x0) 18:37:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3f00, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x100000000000000, 0x7fffffff}]}) 18:37:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'ino,e_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) [ 915.164082] EntryControls=0000d1ff ExitControls=002fefff [ 915.170321] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 915.189615] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 915.229654] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 915.265873] reason=80000021 qualification=0000000000000000 18:37:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6c00, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x68000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) [ 915.295090] IDTVectoring: info=00000000 errcode=00000000 [ 915.328904] TSC Offset = 0xfffffe13bfb4eb82 [ 915.362293] EPT pointer = 0x000000005640801e 18:37:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x80ffff, 0x7fffffff}]}) 18:37:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'ino\"e_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:06 executing program 1: msgrcv(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x1, 0x0, 0xa4a3ad41a879dde0) 18:37:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6c00, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) [ 915.796958] EXT4-fs: 6 callbacks suppressed [ 915.796973] EXT4-fs (sda1): Unrecognized mount option "ino"e_readahead_blks=0xffffffffffffffff" or missing value [ 915.950149] EXT4-fs (sda1): Unrecognized mount option "ino"e_readahead_blks=0xffffffffffffffff" or missing value 18:37:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x680e0000}}], 0x4000000000001b7, 0x0, 0x0) 18:37:07 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x2000000, 0x7fffffff}]}) 18:37:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2c, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x300, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:07 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="c9"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:37:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inod%_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) [ 916.310183] EXT4-fs (sda1): Unrecognized mount option "inod%_readahead_blks=0xffffffffffffffff" or missing value 18:37:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x74, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) [ 916.506229] EXT4-fs (sda1): Unrecognized mount option "inod%_readahead_blks=0xffffffffffffffff" or missing value 18:37:07 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) 18:37:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:07 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0xfffffdfd, 0x7fffffff}]}) 18:37:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inod,_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) [ 916.884066] EXT4-fs (sda1): Unrecognized mount option "inod" or missing value [ 917.030126] EXT4-fs (sda1): Unrecognized mount option "inod" or missing value 18:37:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0xe68}}], 0x4000000000001b7, 0x0, 0x0) 18:37:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:08 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) 18:37:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2d00, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:08 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x80ffff00000000, 0x7fffffff}]}) 18:37:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inod\"_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:08 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) 18:37:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7400, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x68, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) [ 917.428662] EXT4-fs (sda1): Unrecognized mount option "inod"_readahead_blks=0xffffffffffffffff" or missing value 18:37:08 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x200000000000000, 0x7fffffff}]}) 18:37:08 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) 18:37:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) [ 917.615781] EXT4-fs (sda1): Unrecognized mount option "inod"_readahead_blks=0xffffffffffffffff" or missing value 18:37:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x3f00000000000000}}], 0x4000000000001b7, 0x0, 0x0) 18:37:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6c, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:09 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) close(r0) 18:37:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode,readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0xfdfdffff00000000, 0x7fffffff}]}) 18:37:09 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) close(r0) [ 918.233103] EXT4-fs (sda1): Unrecognized mount option "inode" or missing value 18:37:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfcfdffff00000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) [ 918.392955] EXT4-fs (sda1): Unrecognized mount option "inode" or missing value 18:37:09 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) close(r0) 18:37:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0xffffffff00000000, 0x7fffffff}]}) 18:37:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x100000000000000}}], 0x4000000000001b7, 0x0, 0x0) 18:37:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode\"readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:10 executing program 1: ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(0xffffffffffffffff) 18:37:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x1000000, 0x7fffffff}]}) 18:37:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:10 executing program 1: r0 = syz_open_dev$video(0x0, 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) 18:37:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_\"eadahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0xfdfdffff, 0x7fffffff}]}) 18:37:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x10000000000000}}], 0x4000000000001b7, 0x0, 0x0) 18:37:11 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) 18:37:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6000000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff, 0xffff8000}]}) 18:37:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x22000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_,eadahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:11 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) 18:37:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xe0f, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:11 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) 18:37:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_r\"adahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff, 0x2}]}) [ 920.807935] EXT4-fs: 7 callbacks suppressed [ 920.807949] EXT4-fs (sda1): Unrecognized mount option "inode_r"adahead_blks=0xffffffffffffffff" or missing value 18:37:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0xffffffff00000000}}], 0x4000000000001b7, 0x0, 0x0) 18:37:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x500, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:12 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) 18:37:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff, 0xfdfdffff00000000}]}) 18:37:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_r%adahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:12 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) [ 921.230169] EXT4-fs (sda1): Unrecognized mount option "inode_r%adahead_blks=0xffffffffffffffff" or missing value 18:37:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4800, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) [ 921.433695] EXT4-fs (sda1): Unrecognized mount option "inode_r%adahead_blks=0xffffffffffffffff" or missing value 18:37:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff, 0x100000000000000}]}) 18:37:12 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) 18:37:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x600, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0xffffff8d}}], 0x4000000000001b7, 0x0, 0x0) 18:37:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x74, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_r,adahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:13 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, 0x0) close(r0) 18:37:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff, 0x200000000000000}]}) [ 922.180234] EXT4-fs (sda1): Unrecognized mount option "inode_r" or missing value 18:37:13 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, 0x0) close(r0) 18:37:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) [ 922.336894] EXT4-fs (sda1): Unrecognized mount option "inode_r" or missing value 18:37:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_re\"dahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:13 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, 0x0) close(r0) 18:37:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2c00000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) [ 922.668050] EXT4-fs (sda1): Unrecognized mount option "inode_re"dahead_blks=0xffffffffffffffff" or missing value [ 922.801088] EXT4-fs (sda1): Unrecognized mount option "inode_re"dahead_blks=0xffffffffffffffff" or missing value 18:37:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x680e000000000000}}], 0x4000000000001b7, 0x0, 0x0) 18:37:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:14 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x0, 0x100000000098f905}) close(r0) 18:37:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_re%dahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff, 0xfdfdffff}]}) 18:37:14 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x0, 0x100000000098f905}) close(r0) 18:37:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2d00000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) [ 923.171197] EXT4-fs (sda1): Unrecognized mount option "inode_re%dahead_blks=0xffffffffffffffff" or missing value 18:37:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6b6b6b, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff, 0xfffffdfd}]}) 18:37:14 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x0, 0x100000000098f905}) close(r0) 18:37:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) [ 923.411859] EXT4-fs (sda1): Unrecognized mount option "inode_re%dahead_blks=0xffffffffffffffff" or missing value 18:37:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x0}}], 0x4000000000001b7, 0x0, 0x0) 18:37:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_re,dahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:15 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3}) close(r0) 18:37:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff, 0xffffffff00000000}]}) [ 924.077266] EXT4-fs (sda1): Unrecognized mount option "inode_re" or missing value 18:37:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x9, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:15 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3}) close(r0) 18:37:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff, 0x80ffff00000000}]}) 18:37:15 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3}) close(r0) 18:37:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x0}}], 0x4000000000001b7, 0x0, 0x0) 18:37:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_rea\"ahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4c, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:16 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(0xffffffffffffffff) 18:37:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2c, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff, 0x80ffff}]}) 18:37:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000003080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)) r2 = syz_open_pts(r1, 0x0) ioctl$int_in(r2, 0x20000000000541d, 0x0) r3 = syz_open_pts(r1, 0x0) dup2(r3, r1) 18:37:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) [ 925.084692] device bridge_slave_1 left promiscuous mode [ 925.112006] bridge0: port 2(bridge_slave_1) entered disabled state [ 925.180251] device bridge_slave_0 left promiscuous mode [ 925.187081] bridge0: port 1(bridge_slave_0) entered disabled state 18:37:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff, 0x1000000}]}) 18:37:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_rea,ahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff, 0x2000000}]}) 18:37:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x60000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x0}}], 0x4000000000001b7, 0x0, 0x0) 18:37:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_read,head_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6b6b6b, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) [ 926.021721] EXT4-fs: 5 callbacks suppressed [ 926.021732] EXT4-fs (sda1): Unrecognized mount option "inode_read" or missing value [ 926.209758] EXT4-fs (sda1): Unrecognized mount option "inode_read" or missing value [ 937.791720] device hsr_slave_1 left promiscuous mode [ 937.845553] device hsr_slave_0 left promiscuous mode [ 937.914441] team0 (unregistering): Port device team_slave_1 removed [ 937.981308] team0 (unregistering): Port device team_slave_0 removed [ 938.048786] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 938.123907] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 938.426249] bond0 (unregistering): Released all slaves 18:37:29 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2000, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x38, 0x21, 0x2}, 0xffffffffffffffe3) r1 = getpgid(0x0) capset(&(0x7f00000000c0)={0x39980732, r1}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) clone(0x1bfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, 0x0, 0x0) setpriority(0x0, 0x0, 0x400000000000e6) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'tunl0\x00', {0x2, 0x4e21, @local}}) r2 = request_key(&(0x7f00000002c0)='rxrpc\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)='/dev/zero\x00', 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="30ca9dbb662893086d1932e6edd185e8dd6df0f50d9a2026a6cab408935bf3d64943a6b986d39ead10134413e66c09314841ed3edd7661391c982a30ea296fd0fd43dc445b90ca7187a48ce4b01e280e0d0e33bdab93869f05670e4e2014fdceac7bf04a2c3beb3d628a5ab6459618d8a00dacbf43187989257cce46201e981ab906ae708b3804a61348393160d98f7a84db7f268a848678bcd201107d4db22b4d42308338f9c619111d245f546809b4a161494077412d2171c8d6bb04a4abe3ba36d718719888c14b2d881e5018f24fe7aeb54b774070e57f8c57467e82f80a2a3c6a92b5bce2e313fbb2c704bb14", 0xef, r2) setpriority(0x2, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000380)={0x6, 0x0, 0x4, 0x3c9, 0x7fffffff}) ioctl$FS_IOC_SETFLAGS(r0, 0x40046602, &(0x7f0000000040)=0x7ff) 18:37:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff, 0x0, 0xffff8000}]}) 18:37:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_read\"head_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x0}}], 0x4000000000001b7, 0x0, 0x0) 18:37:29 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) [ 938.691297] EXT4-fs (sda1): Unrecognized mount option "inode_read"head_blks=0xffffffffffffffff" or missing value 18:37:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff, 0x0, 0x80ffff00000000}]}) [ 938.853690] EXT4-fs (sda1): Unrecognized mount option "inode_read"head_blks=0xffffffffffffffff" or missing value 18:37:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x68, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:30 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f000001d000), 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 18:37:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2c000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_read%head_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:30 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) pwritev(0xffffffffffffffff, 0x0, 0xfffffffffffffc98, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getgid() listen(r1, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) accept4$inet(r1, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 18:37:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2d000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) [ 939.251370] EXT4-fs (sda1): Unrecognized mount option "inode_read%head_blks=0xffffffffffffffff" or missing value [ 939.347379] EXT4-fs (sda1): Unrecognized mount option "inode_read%head_blks=0xffffffffffffffff" or missing value 18:37:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x0}}], 0x4000000000001b7, 0x0, 0x0) 18:37:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff, 0x0, 0x100000000000000}]}) 18:37:30 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) 18:37:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_reada\"ead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1f00000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) [ 939.710261] EXT4-fs (sda1): Unrecognized mount option "inode_reada"ead_blks=0xffffffffffffffff" or missing value 18:37:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff, 0x0, 0xffffffff00000000}]}) 18:37:30 executing program 1: socketpair$unix(0x1, 0x1000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0xfffffee1) r3 = dup3(r1, r2, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000140)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) write$P9_RATTACH(r2, 0x0, 0x0) write$P9_RLOPEN(r2, &(0x7f0000000040)={0x18, 0xd, 0x2, {{0x8, 0x0, 0x6}, 0x9ef}}, 0x18) [ 939.842721] EXT4-fs (sda1): Unrecognized mount option "inode_reada"ead_blks=0xffffffffffffffff" or missing value 18:37:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x48, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_reada%ead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x0}}], 0x4000000000001b7, 0x0, 0x0) 18:37:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff, 0x0, 0xfdfdffff}]}) 18:37:31 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockname$unix(r1, &(0x7f0000000080), &(0x7f0000000000)=0x6e) ioctl(r0, 0xffffffffffffffb4, &(0x7f0000000080)) 18:37:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x22000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2200000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) [ 940.540277] EXT4-fs (sda1): Unrecognized mount option "inode_reada%ead_blks=0xffffffffffffffff" or missing value 18:37:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:31 executing program 1: clone(0x84007bf7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000100)=0xc) syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") r2 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ptrace(0x10, r2) creat(&(0x7f0000000140)='./file0\x00', 0x0) ioprio_set$uid(0x3, r1, 0x0) ptrace(0x11, r2) 18:37:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7400, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff, 0x0, 0xfffffdfd}]}) [ 940.751208] EXT4-fs (sda1): Unrecognized mount option "inode_reada%ead_blks=0xffffffffffffffff" or missing value 18:37:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_reada,ead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6c, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) [ 941.071506] EXT4-fs (sda1): Unrecognized mount option "inode_reada" or missing value [ 941.186323] EXT4-fs (sda1): Unrecognized mount option "inode_reada" or missing value 18:37:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x0}}], 0x4000000000001b7, 0x0, 0x0) 18:37:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff, 0x0, 0x200000000000000}]}) 18:37:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x9, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readah%ad_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff, 0x0, 0xfdfdffff00000000}]}) 18:37:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1f00000000000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x74000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readah,ad_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x400000000008) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000140)=0x9) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x0, 0x7fffc) openat$rtc(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/rtc0\x00', 0x503100, 0x0) setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, 0x0, 0x0) mlockall(0x1) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) 18:37:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x0}}], 0x4000000000001b7, 0x0, 0x0) [ 943.758499] EXT4-fs: 2 callbacks suppressed [ 943.758509] EXT4-fs (sda1): Unrecognized mount option "inode_readah" or missing value 18:37:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10ffe0, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff, 0x0, 0x2000000}]}) [ 943.953832] EXT4-fs (sda1): Unrecognized mount option "inode_readah" or missing value 18:37:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3f00, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readah\"ad_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff, 0x0, 0x80ffff}]}) 18:37:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2d, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10000a, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10fff8, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) [ 944.352451] EXT4-fs (sda1): Unrecognized mount option "inode_readah"ad_blks=0xffffffffffffffff" or missing value 18:37:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff, 0x0, 0x1000000}]}) 18:37:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x7) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) 18:37:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100025, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x0}}], 0x4000000000001b7, 0x0, 0x0) 18:37:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahe,d_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff, 0x0, 0x2}]}) 18:37:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100025, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) [ 945.007137] EXT4-fs (sda1): Unrecognized mount option "inode_readahe" or missing value 18:37:36 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0xb9) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x2000003102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, 0x0) open$dir(&(0x7f00000000c0)='./file1\x00', 0x141040, 0x0) open$dir(&(0x7f0000000300)='./file0\x00', 0x841, 0x0) 18:37:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000080)={0x9, 0x20}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000040)=ANY=[@ANYBLOB="0100f2ffffffffff0000000000000000000f00e3feffff7fe45000defcb0c0403de1ef51090000000000"]) 18:37:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000f7, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100060, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) [ 945.169709] EXT4-fs (sda1): Unrecognized mount option "inode_readahe" or missing value 18:37:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahe\"d_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgroups(0x0, 0x0) 18:37:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x400003fd) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) [ 945.471156] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 18:37:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f00000000c0)=0x1, 0x4) r1 = gettid() ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) socket$unix(0x1, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) write$P9_RSETATTR(0xffffffffffffffff, 0x0, 0x0) shmctl$SHM_INFO(0x0, 0xe, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_INFO(0x0, 0xe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) tkill(r1, 0x1000000000016) [ 945.586844] EXT4-fs (sda1): Unrecognized mount option "inode_readahe"d_blks=0xffffffffffffffff" or missing value [ 945.669803] EXT4-fs (sda1): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 18:37:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x0}}], 0x4000000000001b7, 0x0, 0x0) 18:37:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000f8, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x4) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:37:36 executing program 1: 18:37:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahe%d_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100069, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:36 executing program 1: 18:37:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffff9c, 0x10, &(0x7f0000000100)={&(0x7f0000000040)=""/177, 0xb1, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r3, 0x4) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000200)=ANY=[@ANYBLOB="0100000000000000010000000000000000000000ffffff7f0000000000000000d0452bab59d889620b11cd73a826242bc7c531d567a77f61b197f29c32deb4776c9d40815c3742f5c2914b4fc4ce629c19ac4745481fb6c7f8f781a596708a86d71ee54cb4ca67070c7824000000000000"]) 18:37:37 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000003080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) sched_setaffinity(0x0, 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000300)={0x0, 0x0, 0x7}) [ 946.042560] EXT4-fs (sda1): Unrecognized mount option "inode_readahe%d_blks=0xffffffffffffffff" or missing value 18:37:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10002d, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) [ 946.210124] EXT4-fs (sda1): Unrecognized mount option "inode_readahe%d_blks=0xffffffffffffffff" or missing value 18:37:37 executing program 1: pipe(0x0) setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x4, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000000200)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000240)=ANY=[]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, &(0x7f0000000180), 0x1000000000000387) mlock(&(0x7f0000ff2000/0x2000)=nil, 0x2000) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, 0x0}, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)=""/180, &(0x7f00000000c0)=0xb4) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000240)=0x80) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0xb704, &(0x7f0000000440)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffa) clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)) [ 946.677855] kvm [4300]: vcpu0, guest rIP: 0x610e disabled perfctr wrmsr: 0xc2 data 0x1000000004ff 18:37:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x0}}], 0x4000000000001b7, 0x0, 0x0) 18:37:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahea\"_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000e0, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x101881, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000080)={0x2, 0x0, [{0xfbb, 0x0, 0x800}, {0xbab, 0x0, 0x9}]}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000140)=ANY=[@ANYBLOB="01000000000000000100000000369c4b2f0eec5150ffff7f0000000000000000"]) 18:37:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10002f, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:37 executing program 1: clone(0x84007bf7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000100)=0xc) r2 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ptrace(0x10, r2) creat(&(0x7f0000000140)='./file0\x00', 0x0) ioprio_set$uid(0x3, r1, 0x0) ptrace(0x11, r2) 18:37:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x101440, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x80, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000080)=0x4, &(0x7f0000000100)=0x2) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:37:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10002d, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:38 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10fff7, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/hci\x00') getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000200)={0x0, 0x6, 0xffffffffffff8001}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000280)={r2, 0x800, 0xb1, "e0c87cc8349258aeba0d5194041cf8f3861452c9e427051f2b151a1424b1dbde305eaee1835b60dfbc87b69adf35b3279f5b325a75ee85dd157e90e0f2f1b538f045547fbaddfdb5a76ed41ef262433da9f4d8ee04dad301ff319d006b65d0adc325ab14d9266def920183f92980bd703213ffcf52942823fa98849553db003baf57258e54aea3d13a1f12738075fc79ac5b3fbfe55f84048d7efcccaa4f697c0f3d822b6281bdb9730dfa191df2a2cf9d"}, 0xb9) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x1}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000100)={r4, 0xffffffffffffffff}, &(0x7f0000000180)=0x8) r5 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r6, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:37:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahea,_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x3, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYRESDEC=r0, @ANYRES16=r0, @ANYRES64=r2]) 18:37:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x0}}], 0x4000000000001b7, 0x0, 0x0) 18:37:38 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000000080)={0x7b, 0x0, [0x1, 0x6, 0xffffffffffffffff, 0x922]}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) 18:37:38 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\"node_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10002f, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead\"blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/fib_trie\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) getgid() 18:37:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000600)=ANY=[@ANYRES32=0x0, @ANYBLOB="96161e729678ff9c0215701d8a3dbf7b3e850c117aabda097b88fb9f2484a49892a73b71fb2e8a11f172fb9d9a6570b243ef73b467e303a63916cc0e6720565402f9e40cdbefe45ca76808113db3c33308f407a8f43a6de30f5c8d36547fd6771b0e71779a750ebf12460d4c2dd7c5cd23ef1f216a0d115f2dced4a5f54a7f4247bb1c7c77d4f7f1cbc100e75a3dd1bc548155435be8ca8ef5bd39d9513fdd2cbf58c2c17e91b7eb8597fee191c4a64a0600000000000000d8fd3f354e501bfb019079c13ed4ab6380b7da148c098a831263ffc29f44b4d65bb92e4fc30a8a789feb"], &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000000c0)={r3, 0x13, 0x5, 0x3}, 0x14) socket$can_bcm(0x1d, 0x2, 0x2) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x101b00, 0x0) ioctl$VIDIOC_S_AUDIO(r4, 0x40345622, &(0x7f0000000180)={0x3296, "9c17269798e138e6a7cda11d082536b18a179a15d649062fcad0265ff81382d2", 0x2, 0x1}) ioctl$SIOCRSACCEPT(r0, 0x89e3) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f00000001c0)={"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"}) 18:37:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={',node_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\rnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead,blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)=ANY=[@ANYBLOB="0100000000000000010000000000000000000000ffffff7f0d0a000000000000"]) 18:37:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64EXEC\x00', &(0x7f0000000080)='\x00', 0x1, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:37:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x0}}], 0x4000000000001b7, 0x0, 0x0) 18:37:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'Xnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'i,ode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:37:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_\"lks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/fib_trie\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) getgid() [ 948.761990] EXT4-fs: 15 callbacks suppressed [ 948.761999] EXT4-fs (sda1): Unrecognized mount option "i" or missing value 18:37:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) r2 = socket$xdp(0x2c, 0x3, 0x0) r3 = semget(0x2, 0x7, 0x89) semctl$IPC_RMID(r3, 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000040)={'veth0_to_hsr\x00', 0x800}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) [ 948.850048] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_"lks=0xffffffffffffffff" or missing value [ 948.899706] EXT4-fs (sda1): Unrecognized mount option "Xnode_readahead_blks=0x0000000048000000" or missing value [ 948.981969] EXT4-fs (sda1): Unrecognized mount option "i" or missing value 18:37:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\x0fnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x401880}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x108, r3, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}]}, @TIPC_NLA_MEDIA={0x6c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6749}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x73e6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3384a132}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffff8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x17a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf3b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}]}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8}]}]}, 0x108}, 0x1, 0x0, 0x0, 0x8000}, 0x810) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:37:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'i\"ode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) [ 949.110844] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_"lks=0xffffffffffffffff" or missing value 18:37:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_%lks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000040), &(0x7f0000000080)=0x4) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x7, 0xfffffffffffffff8, 0x80000002}]}) r3 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x10000, 0x40) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000100)={'hsr0\x00', 0x400}) [ 949.258802] EXT4-fs (sda1): Unrecognized mount option "node_readahead_blks=0x0000000048000000" or missing value [ 949.408100] EXT4-fs (sda1): Unrecognized mount option "i"ode_readahead_blks=0x0500000000000000" or missing value 18:37:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x0}}], 0x4000000000001b7, 0x0, 0x0) 18:37:40 executing program 1: [ 949.534666] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_%lks=0xffffffffffffffff" or missing value 18:37:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000040)={0x10000, 0x2000}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:37:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'dnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) [ 949.609901] EXT4-fs (sda1): Unrecognized mount option "i"ode_readahead_blks=0x0500000000000000" or missing value 18:37:40 executing program 1: 18:37:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'in%de_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) [ 949.738293] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_%lks=0xffffffffffffffff" or missing value 18:37:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000040)=0x8, &(0x7f0000000080)=0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:37:40 executing program 1: 18:37:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_,lks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:41 executing program 1: 18:37:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\tnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getgid() ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)=ANY=[@ANYBLOB="015dff1cab2dd914110000000000000000000000ffffff7f00000000a0000000"]) 18:37:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'in,de_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:41 executing program 1: 18:37:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$bt_rfcomm(0x1f, 0x0, 0x3) ioctl$sock_proto_private(r1, 0x89e1, &(0x7f0000000180)="6a5683b11ac7a26aa7091c3eb515ca1bc6a0559b666b2f9848ac9669c0d93b98a405ba7e3515569d0db2f65b03983b70f5066f1485688f66ec737a3a4c2460a4b7c135d81760350fba98305b1b411dd16e1a14d699f63f47ff2b0925b7cbd41ebd1dcfe5c499b06cba892ed099d36c568158bf87f3d3ec16ced99c81a200600588cd") r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x20000, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:37:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_b,ks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x0}}], 0x4000000000001b7, 0x0, 0x0) 18:37:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={';node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:41 executing program 1: 18:37:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) lseek(r0, 0x3c, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:37:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'in\"de_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:41 executing program 1: 18:37:42 executing program 1: 18:37:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\x05node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x8, 0x440000) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x9, 0x321000) ioctl$KVM_SMI(r3, 0xaeb7) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x3) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:37:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_b.ks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:42 executing program 1: 18:37:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x240100, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000080)=0x5, 0x4) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:37:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x0}}], 0x4000000000001b7, 0x0, 0x0) 18:37:42 executing program 1: 18:37:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'ino\"e_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'&node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x40, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[0x1000, 0x4800000000, 0xfffffffffffffff9, 0xffffffffffffff7f, 0x722cbfff, 0xffffffff, 0x100, 0x7ff, 0x8, 0x80000001, 0x1, 0xff, 0x3f, 0x0, 0x5, 0x6], 0x3000, 0x1000}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:37:42 executing program 1: 18:37:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_b+ks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:42 executing program 1: 18:37:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000140)=ANY=[@ANYBLOB="01000000000000000900e300351e45104e00000000000000000000000000000000000000000000"]) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) setuid(r3) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f0000000240)=ANY=[@ANYBLOB="0100000000000000010000000300000000000000ffffff7f0000000000000000c1125b8fe11de422170e6fe6c496660017392d302c467b914e911089899d074d7f574e0ad7c7e0498ac19665a78f7bb47bece56c2d42dfc1bae4d30e970c68165734d17624d83eaa3f84a9d52900bdef7442c5b8453a0e094200ffffd3cea2c8a15d384097051ac46c82655c77fef50cbffd77c1b9fe0c60f8794896987ed700341ce1b74a859aa0a3d6c148336c622d8a3eb71c843f0547cce7bdf87531861d2402fcf134d98ee8e4a0460147490cf50578fceeefa06988b1bf6b7d4cc15839a05029f17465b25d2d726290156720"]) 18:37:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'ino,e_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:42 executing program 1: 18:37:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_b-ks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x0}}], 0x4000000000001b7, 0x0, 0x0) 18:37:43 executing program 1: 18:37:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) ptrace$setopts(0x4206, r2, 0x4, 0x100048) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f00000000c0)={0x1, 0x0, [{0xa42, 0x0, 0x8}]}) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:37:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'_node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:43 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inod\"_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_b#ks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:43 executing program 1: r0 = socket(0x40000000002, 0x3, 0x3) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='bridge0\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) 18:37:43 executing program 1: syz_open_procfs(0x0, &(0x7f0000000080)='cwd/.\x00\x00\x00\xd8s\x11Z\xb9\x8f\'PO\xf8\x8bZY\x86W\xb43K\x88\x16\xac\xeb\xdf\xf1\x90\x06E\xe0\xbe\xce\xf7\xaaIh\x1c\x8c\x7f;)@\x05A\a\xcb\"\x89t\xd5L)\x82\xdd*8\x02\xb0D\x9do\x05\x1a\xc1\"\x05\x00G|\x83M\x8e<\xb8\xed;F\xaf\x12\xe4RK\x87G\xda\xf1\xdf\xf5\x19j\x13~9\x8bF\t\f0\xd0R\xea\x98\xb8\b$\xdf\x00\x00\x00\x00.\xa1\xc9\xa3\x1c\xe9\xf16\'$\x89F\xb0\x00\x00\x00\x00Ng\xac*S\x84\x11\xa8\xcb?\x1dm\xa7\xe3\x95\xce\x85\xfb|\xd2\xda\xf3\xd9\xc8&\x92\xb4F\x86Zu\xeb\xdea\xe4\xe4\xc6@8?\x812\xefC\xddm\x96\xb3Te\xe5\x88\x027\xae\x00\x7fU(\xdc@\x00\b\xde\x83\xd7\xb35d\xabx\xed+\n\x96\xc1&\xc9\xbc\xc0_!\x1ahe 6\x91\xaf/\xa9\xb8\x87\xac\xbc\xf1\x84-%\x87\xa0Ry\xb9') 18:37:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'Cnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x8000, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f0000000080)={0x6, 0x8}) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000100)={0x10000, &(0x7f00000000c0), 0x9, r2, 0x8}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:37:43 executing program 1: io_setup(0x0, 0x0) timer_create(0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = gettid() timer_create(0x0, 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_udp_int(r2, 0x11, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) fstatfs(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) tkill(r1, 0x2001000000000016) 18:37:43 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inod%_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x0}}], 0x4000000000001b7, 0x0, 0x0) 18:37:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_b*ks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x1fffc, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000180)={[0x9, 0x8000, 0x0, 0x101, 0x40, 0x100000001, 0xd9, 0x100000001, 0xfff, 0xbf7, 0x101, 0x20, 0xcbeb6bc, 0xde2, 0x3ff, 0x2], 0x7000, 0x1000}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f00000000c0)=ANY=[@ANYBLOB="01010000000000000000000010ffffff7f0b31bb1ce5e30bacfcb76199aa1fb3592e0a00000000000000a1fdb248b9abcdcee73d75ce3cf57b1013f72f33931b804bf88711f088c49f193379471de748ecd0c64226231259c9bda43740e2179b8669218e2392f8cf2e16f9dc5a56f994ca6a4a9ad35346bc4d706bc605df024f5054959f5b01dfa51d0adcb3ae55a1975fea1dd4f643badc8ad995e3696cb967bb42c66a7bd7a26b6912d3309fb629f4772342ee9d"]) 18:37:44 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inod,_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\x10node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x2042, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000100)={0x8, 0x6, 0x1, 0x0, 0x0, [{r0, 0x0, 0x8001}]}) perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x6, 0x10001, 0x41, 0x6, 0x0, 0x8f36, 0x40000, 0x7, 0xfffffffffffffffb, 0x3ff, 0x2, 0x8000, 0x200, 0x2, 0x4, 0x10001, 0x6000000000000, 0x4, 0x200, 0x80000001, 0xe8c, 0x7, 0x4, 0x7ff, 0x3, 0x8001, 0x10001, 0x30000000000, 0x9, 0x1, 0x80000000, 0xffff, 0x7, 0x6, 0x80000001, 0xf3ca, 0x0, 0xe2, 0x0, @perf_config_ext={0x1}, 0x1001, 0x3, 0x80, 0x0, 0x5, 0x80000000, 0x5}, 0x0, 0x0, r1, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:37:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_b0ks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000000c166230700000000000000000000ffffff7f0000000000000000"]) 18:37:44 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode\"readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\x02node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) [ 953.816608] EXT4-fs: 38 callbacks suppressed [ 953.816619] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_b0ks=0xffffffffffffffff" or missing value [ 953.884360] EXT4-fs (sda1): Unrecognized mount option "node_readahead_blks=0x0000000048000000" or missing value [ 953.997899] EXT4-fs (sda1): Unrecognized mount option "inode"readahead_blks=0x0500000000000000" or missing value [ 954.079281] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_b0ks=0xffffffffffffffff" or missing value [ 954.169526] EXT4-fs (sda1): Unrecognized mount option "node_readahead_blks=0x0000000048000000" or missing value [ 954.239365] EXT4-fs (sda1): Unrecognized mount option "inode"readahead_blks=0x0500000000000000" or missing value 18:37:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_b\"ks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f00000001c0)=0x10) syz_open_dev$rtc(&(0x7f0000000200)='/dev/rtc#\x00', 0x2, 0x0) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x4) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000080)={0x7, 0x0, [{0x6, 0xff, 0x5, 0x476, 0x96}, {0x0, 0x2, 0x0, 0x1, 0x4}, {0xd, 0x95, 0x8000, 0x10000}, {0x80000007, 0xfffffffffffffffc, 0x2, 0x8, 0x3}, {0xb, 0x1, 0x1, 0x0, 0x22e4}, {0xc000000f, 0xfe00000000000000, 0x8, 0x7fff, 0x100000000}, {0xf, 0x7, 0x9, 0x100000000000, 0x4}]}) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) fanotify_mark(r2, 0x0, 0x40000000, r2, &(0x7f0000000240)='./file0\x00') 18:37:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'Jnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:47 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode,readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:47 executing program 1: clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) exit(0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000380)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000300)={0x0, 0xb5, 0x101}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000002c0)) 18:37:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x0}}], 0x4000000000001b7, 0x0, 0x0) [ 956.069362] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_b"ks=0xffffffffffffffff" or missing value 18:37:47 executing program 0: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f0000000080)=""/19) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) [ 956.149482] EXT4-fs (sda1): Unrecognized mount option "Jnode_readahead_blks=0x0000000048000000" or missing value [ 956.210425] EXT4-fs (sda1): Unrecognized mount option "inode" or missing value 18:37:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x4000, 0x0) fdatasync(r0) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f00000000c0)) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x20000, 0x0) madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000080)=0x10001, 0x4) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000340)=ANY=[@ANYBLOB="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"]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000000, 0x180010, r4, 0x0) [ 956.285737] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_b"ks=0xffffffffffffffff" or missing value 18:37:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_bl\"s', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'4node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) [ 956.417239] audit: type=1400 audit(1546195067.462:88): avc: denied { map } for pid=4717 comm="syz-executor0" path="/dev/dlm-monitor" dev="devtmpfs" ino=15157 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 18:37:47 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_\"eadahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) fcntl$setsig(r1, 0xa, 0x9) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x8000000002) r3 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x5, 0x800) ioctl$VIDIOC_ENUM_FRAMESIZES(r3, 0xc02c564a, &(0x7f0000000080)={0xffffffff, 0x7b777779, 0x3, @stepwise={0x3, 0x3e4, 0xffffffffffffffff, 0xfffffffffffffffb, 0xcb, 0x67}}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)=ANY=[@ANYBLOB="0100000000000000010000000501000000000000ffffff7f0000000000000000"]) 18:37:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000080)=0x6, &(0x7f00000000c0)=0x2) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:37:47 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x3, 0x0) socketpair$unix(0x1, 0x100000000005, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r1, &(0x7f0000001500)=[{&(0x7f0000000100)="10", 0x1}], 0x1) write$P9_RWALK(r2, &(0x7f0000000040)={0x9}, 0x9) 18:37:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={':node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_bl%s', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x0}}], 0x4000000000001b7, 0x0, 0x0) 18:37:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_,eadahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000040)={0x2, 0xe, "5e6258a578a9b4b1e43c801bcb44"}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:37:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x0}}], 0x4000000000001b7, 0x0, 0x0) 18:37:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'/node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x5, 0x30002) ioctl$SCSI_IOCTL_PROBE_HOST(r2, 0x5385, &(0x7f0000000180)={0xa5, ""/165}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = request_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='securitysystem\x00', 0xfffffffffffffffa) keyctl$set_timeout(0xf, r3, 0x8001) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:37:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_r%adahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_bl,s', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000001440)='/dev/snapshot\x00', 0x2, 0x0) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000001480)={"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"}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) io_setup(0xeb, &(0x7f0000000040)=0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001280)='/dev/dlm_plock\x00', 0x1, 0x0) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001380)='/dev/cachefiles\x00', 0x80, 0x0) io_submit(r3, 0x4, &(0x7f0000001400)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x7, 0x2, r2, &(0x7f0000000080)="ebb0adf4be8ddee08c06edde38f8b4c6f0b1ea1ba2641475eacfb39d3c376c3679690d25e8086713b56e2602656e323588914196097abbb6b2e5790d00b33395f80da6", 0x43, 0x4, 0x0, 0x3, 0xffffffffffffff9c}, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x7, 0x7, r2, &(0x7f0000000180)="a2d321a89e969084ee03143cbf574503d75a8399fac06dd95b25574c9d4342e79a90b85b04c1842609dbb6616d4d75cfc311104c8f55a89f405267b3bf59ef3f1bdcf9b80d2166c975ce5a0f6a2cf8da797c99b8a8d8eecd3dbdca54db6789b440814a05f3ebcc75e4aa948db987887e1b158d8d3451e20de29cc846b661c0c2ed07b291f0f5e891431c379f051fc4d0e7dfe98d09f85a6a032150cfbb104ab3c6a4693d03deecf6cd2f6e3608560635494dc1467abe66a327768025bde40c598a6a06bfe43698332bb80e7047686ff41a463260fabb32311f7689b465c4af3aca88fd0536caee02a0030c359ae713f2ed446ec96dc231343b626e1870681df0f75e8872a8a455a3088f89ff78ae669ed3b8edf5b9e33abc9ff368701dfa42fc802965d1fa13b76c8e277b3b124306ac29bff632afd5b837ec29ee6faa18ceb602a5f6b708b7c5287e9d4bcf24eddf997b632bcf5460293657bd2c3180133c167acf48639eba4125c1c7c3b6d3d4d9390e21275be6d3f78e45cb1aa937fc558179a07bbc6b4c62f41b41fe21ec2f0b7573d14433adbc39d917ef4ef1f136584326476a9e16dfdbcf2e9cd6744294529656fd5f55d1b28b78125c14540f435f8464b7f62178191f05f4e95d105c03ead9e11e34532f4558b1ff045e9ab696a776a6ce33969e2634aef42f8451e8cb63bcc1bb5a5452f8671c8ca38ac65ade6d27f931301e766281bf121cee75064ea116a5bd4e3a5cc346b9b77d7a59b316ea9e0a09315703dfcb4324b2a8d797205fb12eb6b2f613911d312845d960b52044badfbfb704d8a094363ca01e5744adb4a4db5a93037476e1c90bedb38db9a6b8826d9c0bc966e5e5183a6bfaec88c6171371fd6943230c939c4a191361f916bc74c9c67c2c1d6af90169fb2d87f6adcb199289ec0a1114eba24683f4be7bdb6e27526c8a52551485afa872feb91eea10d2c0bf00137605ac198df8f1b1dbcc489218a00252419e276f22a6eacedc97c27a99f2442a735b2702a1bc3014721dc5d7e194b0244818d79ccd37a463b97a668e558f5c3c8ff99037cf45ff4062337e2a612bf85e333fef354cfad9931c6014b675ba78abdcdc05a9359341ac5913a82c81ac7d3370f4f77272c6eec1c1220a04e53c692c133510ebbaad670e9c465b2a392cbce8c00293be35347b7448c81331fe4d8824c609d4cf98aab98ec0629eac0363cc3ba8c91aea5894ed2b3c20448b3b5b92c5ada1a2840ba3db18e6cbc2973dd6cf6456db7822c4c55526a4ffc3e533bff82c02d5a1e62b586ad8a0c464cebe8841f5c1d63d6a3f925318ab5a75ea8a7d3cdeb27e4bdd6dd5a37fcc5a008ba209229ecdb72a6ee050afc586b40557b440fce826382c6c3b3d5022ca32183b1b15aeaf77d54f4343a0de1c437d9338a925c75de182f2ee8b1c29959912be8dd6bf2d721b6bc8bfd4a6b942d4b4cad527c080ca10beb70192604fe8d77ce5786e6bdcf0c5fce2f99293a49eaf44ec8a4ab5ffad78c9a5f677d060a4586898b1d318d3085247e4051a3eff50d900031ce594800fe1281e2061c0fbd552b5f00c622f6cff8647c9e6eb861fc0dd62794369529d29ffef82d267d3eda14126be4e956cb395a578e4c637b47b7238467cf14ef0cde2f5740ca0679e260a47e9b9a2a5eac4d1cc960bdd864ab0af8554693f29518cb56ba39f4858f2200dbf64dde3879647a3c49797864867c12c45e36e72880b4c45ab61547487f4b2a8dc4229ce1e306c19521f3a966868c546cf964babc5081fc0c3637796c6385f59f8b2a4e5a533781c7267319a618ad5477faae47f4cd6d3a477c88455b8c658940f1d47e2762a13c168382edaa87c2f2c8099f77f6bb2964f4becff84b6c3a716bb741bcd1efada48c55065732e1b331a1ebff7ee402f556201e27fb44a1a7f6183572a6448def3b34ed05d6b1b3a541736666c66c7dada49dc8cf0fe792d3379d3868efaefe7850e1df661f4985594afc44c2ba48bfe98c7cbb6639f739ec217b99370b61d0ad98de5893242d5e2126fd25a1ab8f02e0f8bdba066a48840d9701223006ca2f68d357e858df8dd461e5c2d03f0183f195bf444661ca22a247fa8f7087bab49586fa2202383183adc1a57a89f285c8e175d6eeff40665eed340650b3364093407fde19600cdb72819500bb46e9c2e63e2122a9bbd449e700509a2a2803586886e75a05ca23764a6678bde491575fb22731239fa95a56918f89ef95e99d4139419620d259a2f422594e0ea934fadc5f3e658bbcab73ff08f57b0cd2cdc4ccdae6ea270cdcaa2545a045d53164d2c5125c8a9037206d1efcb6a232b941bdfdad2a3cb9f46bf8583911ecbe2bdc010d9afef94fed7c3edd8c5f9f9ed185cfefebc5e07eb0eafbc7edd72ee9b17bcb0564a9d19bab604a99303d0b86524c3667de75d2e95d2a487522aa801b6d38b676abe401f8c240157f5cbcbe76083ec528585f3af016d292c5356a597b8ef74fac99b163b64162dc4ebb761e661406242cd4753e82905fbd28cb09e83c5ba74728d5bc1bc6985364926aa49270f70915223c5aa85d6c232448d0631314f8610f2be91d4b42002b116be59580f672072e4932c8f8c6559342b0dd2dd3f6e90aa449a1bb4da25719d30f57a84eed99c383453f86b03ca22fc52a07b659f3077105b98a481131a39511f5a1ab2986c715d2fa37c388a123ca0e17a6cfb96a3c48b9a4b8d68f3168b45433b4738348757d98d2fd48937594e3c371cf3f81318ac0f4b3e2e11c109ce8e6307985dd472f24221f8353d51688b136fc4cd57e8eecc91292e58c2a60a21c3a2017f5d22d53d62855652434e3d8385f5f04b607aabadae91de841eba7bb7d0c8a0f118bc514b602a17d474a420ed497099cdc9d0b9bb5b1a32fc56dec4c96b9f5acd890f95e9bbe01583e9f63bef132f266cc9a6551361aa913d209fca3cded56eb185da295802bb3c170077d54485ca519b74afb70649cf73aa89fd7c5a5f9a1ae112434aa1f4b479a1199671263f54590fcb8fa247386797350a959f88669bc2a5850741b0ad96e30719226fbc70b6c5c2a591e281e65952168f7284a7e10af9720bf5f53d999f2f65ef7618b1ba8768d02822c8d6049f80152c4402118d2dc674a4c63ff4f8ddf9add0828ed370e2bd0bf6b0ebbf1f9446c1de41c46f5c033a2ff1827c0aab6bfbd22461ecc9a747341f4b40e0954e3b3446e6412601715ebbe9444d9208abad4d3d8c09c92a734fa613e0b3d40dfcb675b5ee2e5a2497dc736a862ff57d22d902902aecb16851bdca03cf40e32150259e55a3761a3c4708fbf15429294166e63084ed210cf469312c13493dc99d52cb575352658d03097081b282d5ef19481716c693b202772cec4ab964d8fdbf14820f3a5e831ba76f65ffa336db0034995c2c42bbe157d2ccf4a1f4d6d58e52a36c28b8bc3a2420d32f0f1dd10db154657a85e1a3f5ccb9d3efdcd7b179859f8134bbe43f15e7b5e2b002edbf01bf000b5797ec18f767fe632da82c13d43d505090817ac1eabce0f2cbfc70a3622248efc2107e4bf07e6550d67036c6944708a5f7f964c53bed320de38e6c53d297b9237d10be7e408f62388d52b3fc5cf9a253eadb5ffe95d7578e7ae803e753a6172ef5ebb30756b96e935baacb5274fb86a75131c537350e740b523c2725a47d45a6a778e2a4e0faa03237535c6bffd7d8d2446b4e3f68d9ddbd092344d09a8929c869a0cbf77253d673a23e4a823c914a347b136ca4577c6e1687bad4c9fac1b8a02906f93099732ed795d2c84a8bef61df2b9a4de2851e35a73aa627cfff2d900ddf83292f927eaaea24ca83cc8913fb23d8240fdf1f4f2b53edd0ef1afc1b7a53fbd5d57ab03b260a3cc0cd7d6149f868a38da282b77fce9a26d32e345584ebe734989b9c30a72c97b88da20185e408a242d99ff1cf98606f4a497c2bbbd1e0a7d45ce8dbdeeca8b975b4b78f1ca99c58a4933c0380511d90ff01f6793c51f27f4c98abe28d69473a4c85deb4d212c5ab75b7caf5cbc51672ce8b9b4dce7fa7f2a223562624feb5bc3f718868063acc81dbed5e24cae16bfeed2198a9fe0883852081f85709934d2c641c04f8a4a886e03d1f8efa5297eab3e70cc57977b9b423370c3e5955c0ce2be08b8a14ac1b11de3f7fa96f4ad6ba37d28627f273cd55470fb0876fee7a8767d34def65989d805c6432d58fbd95871b6bd74d59bca35c123a9eb8c2e2977c189ea735c817bc2ffc633533589558ab8c0ae0f7a97d96e35494e54883d9894bc23c1aa903c2a727570fec54d5c1517a5ca6d55eafb3da498327237c94bd896b4f4c21fbf6b05b531562b99bfec294cf59bc6373b84e1cb5f4f090ac336b7fb54a392b15cbb78ca28301c759969e6d5c1237bc2940d61b0288bbf402bb733116ede204513095d7249eeb07e89114560b994babc55b00bf5d4a919a6b9fb32d1af950a11ef5a3a15c6d6080808e2f6121c8146704579ebbd77cccf126e4b4c12a465db25f3a75fe600555fc437367cacb206808b12e92f2c2b95621238a69ea08f28a2ef227c94ca09ab35df0f048cc37908a181d8aefc265eafc302a48e294092a5ab65989eb06d8d826a643103e50ae04d372702f8ad05c59035c65cdcbc42f405fd22a8398de750eeee2c7cea20f31856863e9a93052b507da391ce6536b3c9f272aa2e8c3aefe22a737029ce3e9dd59203c3bf8112baf4eea37334b39e99f0c198ae0d50147855881931264b23919db1d675f6b50a373d71b9c648a3dcb0514a0dabeaf24dfbd44615be5d254d3a160375f300c02767ff9fad4e2c77ebc10814d023be1049c1801ddce9decf1d0bd19fb471b5a479620a8050c620df7779b6e4df31cd76a64674c3396e6f2aacb33f9d1f9002eb91cf00329ab2367721d870a92f071b7695e749da6b545ed6cd5e9f61423d8f12f4cd1c11cacb5f98396f99bad8f11c23276a2a3098a2a7ce0cd47f0371f30d142a02a10e4640099d00d7b8f8f5d871d4a9cae9cd8acccb0a386fb02c786c49e50ee2684bf7651b648297705d358c98247b0ae1a39b0c8d97cdb86a87674845f8c20c138c160f9e43360027b01550453b4412712841e90c9a3e576a9ec10335e6be49c193ec917eceefefc56f6c76a211278fa83c4707226dcb827abeafe89718a6e62e568deefa35bc023ed823255e068568be2b295d2a55b4d15cce5c0ba8afeba9009928a02086ba61bf7451013d3e7e91922705fa2017b538ad32a7733f3f26ced234036525a23c0b916fd22299505ddbadc0a113d37bd7db6d2b6584b7177c6a806371255f91b86ce3a9832187c928bba31419c3ae55aa55e0e03b1e6b07e0af26e942f6edf3d0b13a5a29659a5cfa3a6800c28d868649b2de497408c190f0c5505befc37359bac788630baad8eeaf188dae2af669a8380ba021df0e3b844ac9baa4a63f9ab6d8505e15fd0fd706664f9e7df05703835e164d5ee71858e23119a2a6feaeb5c8dd325d67b1693cc3ce1f38bfc0698b9fc1f8464b9e0719b74c77fd5bce057c69118584ed68ce74d2088900a1c6b7ad38c3819432abd2a660b17a57619e5e10c8ffa5a2e56c695bcd18313129da4eeb5428582395fa47b63765bc134bed5e9e0cd80682aade92758d2b0b14f7e2508a62ec421f0752d2f2c0c84d6b5b0edd9bbf4ceff04d4f139500e90c886d4d5fe46cad8a0c982b38d5f12b334c03ea4aa325cf614ab0120885014e55626057b2219aa7104e59ea3c412c1c0a6cf2c30", 0x1000, 0x2, 0x0, 0x2}, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x6, 0x5, r0, &(0x7f00000011c0)="a909abdddbbcb2a58698a9ea307c1c67912fb3162ee650a43575e0da79b4763d008fa240109074de4bdf9e4045b070f432768fcf2ad2ad72d73b9a8ee288d5ed5c40b4e4ba6366b2014dbde0e2732557bd8362b84c23e2b98685bad3a118c1cec35bec736ee1c1526b1550ad348eb41b982e11dfa733292994aaae85f106a3463f892401a16e9d51dbb491dcb3", 0x8d, 0x4, 0x0, 0x2, r4}, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x7, r2, &(0x7f0000001300)="51b2a323ca0e97829766894a839234090a9ae4c48f7c380a9f995b10d7de6aede6d0e5da958675492bd5a41fe0a52585e6c93f2335137bbd0208965c57d545da63870208c838caf07c9cb1e169684ec83cbd5c18207a6fbc208ae20e10fd052ad9bf3abfc185", 0x66, 0x0, 0x0, 0x3, r5}]) r6 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r6, 0x4008ae8a, &(0x7f0000000140)={0xaaaaaaaaaaaacc5, 0x0, [{0x4, 0x0, 0xfff, 0x800000007fffffff, 0x730d58a5}]}) 18:37:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\x19node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x0}}], 0x4000000000001b7, 0x0, 0x0) 18:37:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:37:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blkc', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:49 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_r,adahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'7node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:37:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000000c0)={0x7, 0x0, [{0xc0000000, 0x6, 0x40, 0xffff, 0x400}, {0xa, 0x100000001, 0x6162d920, 0x800, 0x8}, {0x6, 0x80, 0x40, 0x1484}, {0xd, 0x200, 0x6, 0x1, 0x1}, {0x80040008, 0x7, 0x8, 0x8, 0x5}, {0xd, 0x55e, 0x8000, 0x1, 0x5}, {0x40000000, 0x7, 0x98, 0x7, 0x6}]}) 18:37:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff, 0x0, 0x80ffff}]}) 18:37:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:37:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blkX', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff, 0x0, 0x80ffff}]}) 18:37:49 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_r\"adahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x0}}], 0x4000000000001b7, 0x0, 0x0) 18:37:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='wchan\x00') ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f00000000c0)) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000040)=ANY=[@ANYBLOB="0100000000000000010000000000000000000000ffffff7f8bfe2edc32fc710000000000000000"]) 18:37:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'bnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff, 0x0, 0x200000000000000}]}) 18:37:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blk%', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:49 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_re\"dahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) [ 958.868302] EXT4-fs: 26 callbacks suppressed [ 958.868358] EXT4-fs (sda1): Unrecognized mount option "bnode_readahead_blks=0x0000000048000000" or missing value 18:37:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, 0xffffffffffffffff) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) fchmod(r2, 0xc86eb0ccd243b592) 18:37:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'gnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff, 0x1000000}]}) [ 959.157475] EXT4-fs (sda1): Unrecognized mount option "inode_re"dahead_blks=0x0500000000000000" or missing value [ 959.254446] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_blk%=0xffffffffffffffff" or missing value 18:37:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000000000001000000000000000000000000000000"]) 18:37:50 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(0xffffffffffffffff) [ 959.350897] EXT4-fs (sda1): Unrecognized mount option "inode_re"dahead_blks=0x0500000000000000" or missing value 18:37:50 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_re%dahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) [ 959.449714] EXT4-fs (sda1): Unrecognized mount option "gnode_readahead_blks=0x0000000048000000" or missing value [ 959.529751] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_blk%=0xffffffffffffffff" or missing value 18:37:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x0}}], 0x4000000000001b7, 0x0, 0x0) 18:37:50 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x0, 0x100000000098f905}) close(r0) 18:37:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0xe562, 0x5, &(0x7f0000000440)=[{&(0x7f0000000180)="89a5a314c8dce9cf8321b8be2772a598dd05111f177913d743cea0091668afcba67bc10dce226c33b1cd426e44dc2011dadf3af6f512dc87862dae33391fb525fbd0197bd614e891064e4166dd57fc0144721d52989e907fb24dab5bd6a56fba8928ca8f4b40891435b31b8d4f96d245e0a77cb786f8bbdf800a446707d721b8e95032fed0405be8bbee9f1bcad0bf370f69dcaf569e18be345a67d24b7da43b6eafbebeaf6282770cdd414801661c1df5180232da4b7c7697b12643e70ba9b8bd716483eaf37a933ca8e7aa5d55be", 0xcf, 0x5}, {&(0x7f00000000c0)="c598802a6827e50f177fc127cc0881a892a3a01c020acf8e8142c21cd9761a", 0x1f, 0x3}, {&(0x7f0000000280)="c02d3d48a67357b4f7dbc141b38d58d1e9c9b818ba97b69cf38088382e7a492efc5d482adb9414500402d08a6bbd87a5fb5f97bb4df8a4b2099b8ea9cbe3a80ea9a836990009723651b727017620e0cd83edcd38fd9798f71a686c6c50aedabd3e69136b172e4df06db3db67858de027752c36d5045ced641ba91399115db4aad92276591ce0f165eae0da99", 0x8c, 0x200}, {&(0x7f0000000100)="cf40cdae2d2cb91e72eda4345999b45e9e615411490c653fb624f7064194174e18e5cb5546c061dbda3c91", 0x2b, 0x100000000}, {&(0x7f0000000340)="205ae6f0f7b853c466d8034711b0c142f2a024f8a7c3f999b21e1438904a8aa6600207fc7181600370a4e8e8d6b73483973b7225d633f4e1671980709f4fd5e8decfc6310d9364de71acc9327b9e92ae7175f5368b42579de965eee205fae62772de8be6fb8ab83c1563ff65e1028945b8ca61d4d0abd420130282469dfb850ad7a2058fb24fcace2cb25b1ca0714cc4648d59d81af3441079bd56dda0ab60d40437f08e096c0130e302f170284d6469818a1e352596f78f25f8dd51c569bb8687ddc46654cbf987", 0xc8, 0x100000000000}], 0x840001, &(0x7f0000000600)={[{@uni_xlate='uni_xlate=1'}, {@shortname_win95='shortname=win95'}, {@utf8='utf8=1'}], [{@pcr={'pcr', 0x3d, 0xb}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@uid_lt={'uid<', r2}}]}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:37:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blk,', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0xfdfdffff00000000, 0x7fffffff}]}) 18:37:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'anode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) [ 959.743387] EXT4-fs (sda1): Unrecognized mount option "inode_re%dahead_blks=0x0500000000000000" or missing value [ 959.877402] EXT4-fs (sda1): Unrecognized mount option "inode_re%dahead_blks=0x0500000000000000" or missing value 18:37:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'in,de_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x8, 0x422040) ioctl$VIDIOC_G_CTRL(r5, 0xc008561b, &(0x7f00000001c0)={0x6, 0x7}) ioctl$KVM_SET_NESTED_STATE(r4, 0x4080aebf, &(0x7f0000002080)={0x0, 0x0, 0xfffffffffffffe7e, {0xffffffffffffffff, 0x0, 0x1}, [], "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", "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"}) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) r6 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x0, 0x2) ioctl$PIO_UNISCRNMAP(r6, 0x4b6a, &(0x7f00000000c0)="6444ccdda7ab1398a7946797060f4850671f355bfd840e9872d129216554677758507a6f882a693a97fe89852805b19d1e35a0ad5c7562010831da06ed0a5eb64f2270c85395242631ea8331d75b6a7dd6db7a62a155c59e1f1316f209b2930c19") r7 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r7, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:37:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_re,dahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) [ 959.999259] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_blk" or missing value [ 960.060315] EXT4-fs (sda1): Unrecognized mount option "anode_readahead_blks=0x0000000048000000" or missing value 18:37:51 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000280)=0x1, &(0x7f0000000300)=0x2) accept4$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x0, 0x80800) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000100)}}], 0x3b2, 0x0) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000001180)=0x1, 0x4) ioctl$VIDIOC_TRY_FMT(r3, 0xc0d05640, &(0x7f0000000100)={0x0, @sliced={0xffffffff, [0x3ff, 0x101, 0x3, 0x0, 0x9, 0x20, 0x40bb, 0x1, 0xb0dd, 0xffffffff, 0x5, 0x2, 0x80000001, 0x4, 0x0, 0x1, 0xffff, 0x0, 0x2, 0x9, 0x0, 0x0, 0xffff, 0x7, 0x1ff, 0x1, 0x7, 0xd2b, 0x0, 0x9, 0x7fffffff, 0x7fffffff, 0x1, 0x1e, 0x7, 0x0, 0x9, 0x0, 0x1, 0x101, 0x4, 0x7fff, 0x1, 0x895c, 0x4, 0x6, 0x6, 0x4], 0x2}}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000004c0)=@sack_info={0x0, 0x7d, 0x8000}, &(0x7f0000000500)=0xc) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x42001, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000540)={r4, 0x40}, 0x8) munlockall() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpu.stat\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400201) syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0) r7 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) dup(r5) ftruncate(r7, 0x0) 18:37:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blkp', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'Onode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x0}}], 0x4000000000001b7, 0x0, 0x0) 18:37:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x2, 0x0, 0x7fffffff}]}) 18:37:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_rea\"ahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000001c0)={0x1, 0x0, [{0x8000000b, 0xffff, 0x3, 0x3, 0x401}]}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000040)) 18:37:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x2, 0x0, 0x0, 0x7fffffff}]}) 18:37:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blk*', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'!node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0xd, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:37:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_rea,ahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x400, 0x0) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f00000000c0)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000040)={0x12712, 0x0, &(0x7f0000ffb000/0x2000)=nil}) 18:37:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x34, 0x0, 0xffffff98}}], 0x4000000000001b7, 0x0, 0x0) 18:37:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x101000, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r3, 0x10f, 0x84, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 18:37:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x0}}], 0x4000000000001b7, 0x0, 0x0) 18:37:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blkl', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\x17node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_read\"head_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_IRQP_SET(r2, 0x4008700c, 0xb65) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:37:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blk\"', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'Tnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x2) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:37:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_read%head_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x2, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:37:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x280828}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r3, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}]}, 0x24}}, 0x8000) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:37:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blki', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x0}}], 0x4000000000001b7, 0x0, 0x0) 18:37:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\\node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000000, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)=ANY=[@ANYBLOB="0100000080000000010000000000000000000000ffffff000000000000000000"]) 18:37:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_read,head_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}}], 0x4000000000001b7, 0x0, 0x0) 18:37:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:37:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blk+', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'cnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 18:37:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_reada%ead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blku', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x0}}], 0x4000000000001b7, 0x0, 0x0) 18:37:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x1000410, &(0x7f0000000140)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}, {@nfs_export_off='nfs_export=off'}, {@xino_off='xino=off'}, {@xino_on='xino=on'}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/kvm\x00'}}]}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000380)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[@ANYRESOCT=r0, @ANYRESHEX=r2, @ANYRESOCT=r1, @ANYRESHEX=0x0], @ANYRES64=r2, @ANYBLOB="2ecafc3f75e1c88e6686923c563f187b608cee249463e7cd1849045dfeb2e9e326b58c944b711d0bfcaa4bca402b79597e434177bf0048c5b54ea9331c872cfb01406a5c87a8cc0c09092c8f958a9d43759f4683ccc8befa24baf9b47bf1403c17088ea41fac50f0499c7534491b893551515fd314d8453687c5cf2d84d7efbbb82dddc76012ff8c85ab529779f254dc15d927e17433c14bdb4accacd06092ad8e8776e806fa35331e8afb971472b379dda77b12d11e0156eaca030f84fe894823efd621aa46c70391e27d0a1827ade1e8decb815fe46fb0c183363bf3dc2e5be22ec658b9887711be8155", @ANYRES16=r1]) fcntl$setflags(r2, 0x2, 0x2) 18:37:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'9node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_reada,ead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\\node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$SIOCX25SCAUSEDIAG(r3, 0x89ec, &(0x7f0000000080)={0xd2, 0x400000000000006}) 18:37:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blk0', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\fnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2d000000, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000040)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)=ANY=[@ANYBLOB="0000800000000000"]) 18:37:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_reada\"ead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) [ 963.949348] EXT4-fs: 39 callbacks suppressed [ 963.949358] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_blk0=0xffffffffffffffff" or missing value [ 964.057101] EXT4-fs (sda1): Unrecognized mount option " node_readahead_blks=0x0000000048000000" or missing value 18:37:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4138ae84, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) [ 964.109136] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_blk0=0xffffffffffffffff" or missing value [ 964.208117] EXT4-fs (sda1): Unrecognized mount option "inode_reada"ead_blks=0x0500000000000000" or missing value 18:37:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x2001, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x8c000, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r3, r4, 0xf, 0x1}, 0x10) 18:37:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blk-', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x0}}], 0x4000000000001b7, 0x0, 0x0) [ 964.309760] EXT4-fs (sda1): Unrecognized mount option " node_readahead_blks=0x0000000048000000" or missing value 18:37:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x7a00000000000000, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'Knode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) [ 964.405957] EXT4-fs (sda1): Unrecognized mount option "inode_reada"ead_blks=0x0500000000000000" or missing value 18:37:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readah\"ad_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) [ 964.519328] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_blk-=0xffffffffffffffff" or missing value 18:37:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x4800000000000000, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x2, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) [ 964.644974] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_blk-=0xffffffffffffffff" or missing value 18:37:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blkx', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) [ 964.759908] EXT4-fs (sda1): Unrecognized mount option "Knode_readahead_blks=0x0000000048000000" or missing value 18:37:55 executing program 1 (fault-call:2 fault-nth:0): r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) [ 964.822310] EXT4-fs (sda1): Unrecognized mount option "inode_readah"ad_blks=0x0500000000000000" or missing value 18:37:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000040)=ANY=[@ANYBLOB="0100000000d460b65b97f63b0407558d0000000000010000578b28d30000000081995482ba1559bafb4140794a9fc65a03000000914e65e9a218491c86bd4cc357047d7112ef717c3eba67dc494f006356e949688cc34dcf636755c21ae7eee337b498d5c6c32e033c0b4454ab5ba30e115b536c94d4c4f7585390c1e7"]) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0xdd15, 0xf00) 18:37:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'0x0}, &(0x7f0000000540)=0xc) fstat(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000600)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e24, 0x4, 0x4e21, 0x4, 0xa, 0x20, 0x20, 0x3b, r3, r4}, {0x0, 0x6, 0x2, 0xfff, 0x38ed1a04, 0x4, 0x2, 0x7fffffff}, {0x8, 0x5, 0xffffffff00000000, 0x7}, 0x9, 0x6e6bb0, 0x0, 0x0, 0x1, 0x3}, {{@in6=@remote, 0x4d4, 0x6c}, 0x0, @in6=@loopback, 0x3500, 0x7, 0x3, 0x7, 0x1, 0x5, 0x2}}, 0xe8) close(r0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x28) 18:37:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\anode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:56 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x102) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) 18:37:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blkd', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:56 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000000)="1a56bffb4b745124785fa1b94d46e2355c38ea68ca3514c6526866218c316026a421624f4a6c1a7b44e43010947b67460bd9e096160584c4964ac1ae7f8f618b9677bffc44a3450f0d384ee8c333fd1daa4b04dc858639a4c1431cce63a5298e8e59638450cb29e0323594a7b45cd14ea61342dfe411f6dcbf84df3d6fd455a5c9d89927562ad58ad291dd3972377fe82d03bb295819ab48ed8baf9c42d44eddd467e669d656db10e00738136bdaa0d9152aba547e87f5782c302c97bee18f745a8ba22c1f0a30fcf21567a5807d5383f4c38200cf8fc6564830135cf8e13517dd2d8842fe66ada1002c92a7198f9beaeac9aa3272f10386c4ca15cbd7f507f6") ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) 18:37:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x0}}], 0x4000000000001b7, 0x0, 0x0) 18:37:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) ioctl$KVM_GET_MP_STATE(r2, 0x8004ae98, &(0x7f0000000040)) 18:37:57 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) 18:37:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahe%d_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'Fnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blk.', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:57 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x8342, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x4e21, 0x30, @remote, 0x4}, {0xa, 0x4e24, 0x6ebb, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x43, [0x7, 0x3, 0xc8, 0x5, 0x2, 0xcd3, 0x26f8, 0x74]}, 0x5c) r1 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r1) 18:37:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000040)=ANY=[@ANYBLOB="0100000000000000010000000000000000000000ffffff7f0000000000000000d757"]) 18:37:57 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x6, 0x101000) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x3, 0x84000) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080), 0x4) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f00000000c0)) close(r0) 18:37:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahe,d_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:57 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) 18:37:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blko', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98, 0x0}}], 0x4000000000001b7, 0x0, 0x0) 18:37:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x7) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)=ANY=[@ANYBLOB="01000000000000000100007d1300000000000000ffffff7f0000000000000000"]) 18:37:58 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x2}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x200000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000140)={0x4, 0x8, 0xfa00, {r2, 0x7fffffff}}, 0x10) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RCLUNK(r3, &(0x7f0000000040)={0x7, 0x79, 0x2}, 0x7) close(r0) 18:37:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\x14node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahe\"d_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x22, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:58 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x400001000009, 0x100) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905, 0x3}) close(r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000200)=[@in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e20, 0x5, @empty, 0x4}, @in6={0xa, 0x4e20, 0x7, @loopback, 0x200}, @in6={0xa, 0x4e24, 0x100000000, @local}, @in6={0xa, 0x4e22, 0x5e, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, @in={0x2, 0x4e21, @empty}, @in6={0xa, 0x4e24, 0x1, @mcast2, 0x2}, @in6={0xa, 0x4e21, 0x6, @dev={0xfe, 0x80, [], 0x12}, 0x81}, @in={0x2, 0x4e23, @loopback}], 0xd8) r2 = accept4$rose(0xffffffffffffff9c, &(0x7f0000000000)=@full={0xb, @remote, @default, 0x0, [@default, @rose, @bcast, @rose, @bcast, @null]}, &(0x7f00000000c0)=0x40, 0x8000000000080800) ioctl$sock_rose_SIOCRSCLRRT(r2, 0x89e4) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r3, 0x89e8) 18:37:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000040)=ANY=[@ANYBLOB="0100000000000000010000000000000000000000ffffff7f000000000000000003f839f16ad6ddf037341da7a581f4216f111311a30de73fcd4658d9dacc86cdb27196deedfea98d1d1ea6549f177f0452af7f6fcb3f22de023b0d34c6b2e436c5e0b2103879785b49c9e58dde985f92d9b08a249651b20d55021b9fcaff7f5526e665a0541f44fb337e622e90e5a0c0fbe773639ed4237e968a9bf0d0ae0246f15deacd09d8f486ccbaf3cd35aaa8ffa92837b66d9bf9c8206f8509ce4d"]) 18:37:58 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000000)={0x0, @data}) close(r0) 18:37:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'3node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xe, 0x80800) getsockopt$TIPC_NODE_RECVQ_DEPTH(r2, 0x10f, 0x83, &(0x7f0000000100), &(0x7f0000000180)=0x4) ioctl$sock_inet_SIOCGIFDSTADDR(r3, 0x8917, &(0x7f00000000c0)={'nr0\x00', {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:37:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahea\"_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x7}], 0x4000000000001b7, 0x0, 0x0) 18:37:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x25, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0xfffffffffffffffc) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000ffb000/0x3000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYRESDEC=0x0]) 18:37:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\x03node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahea,_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x400, 0x500) r3 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000080)='/dev/kvm\x00', 0xffffffffffffffff}, 0x30) r5 = gettid() fstat(r1, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001600)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000001700)=0xe8) r8 = fcntl$getown(r1, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f40)={0x0, 0x0}, &(0x7f0000001f80)=0xc) r10 = getuid() ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000004480)=0x0) r12 = getpid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000044c0)=0x0) lstat(&(0x7f0000004300)='./file0\x00', &(0x7f0000004340)={0x0, 0x0, 0x0, 0x0, 0x0}) r15 = getegid() sendmsg$netlink(r2, &(0x7f0000004440)={0x0, 0x0, &(0x7f0000004240)=[{&(0x7f0000000100)={0x1448, 0x15, 0xd15, 0x70bd2a, 0x25dfdbfd, "", [@nested={0x100, 0x39, [@typed={0xc, 0x41, @u64=0x2}, @typed={0x8, 0x73, @str='\x00'}, @typed={0xc, 0x43, @u64=0x3}, @generic="aa193098afb2e2ee1d6de0c26672d9e0a2b430d7481684b817b8233d65dbd2ee7249c81c9055a7e41aa419bd686b8895d5191798329c850b0183a328e48951974937344d02c98d50235d3bab1a64f096ba2c785794e02ed58e90fd2f6b8be1281678aa310a7821ea6d8df7dc61a83adc30089aa8e4a0a54bf075129830f0cf97d66e2c2e1728f83467d2817262af", @typed={0x8, 0xf, @ipv4=@multicast2}, @generic="1d3876c339049e47e2aceeb96ab906495a1fc93085e5e571c0c111af4b63a5725a09f56975e653ba5e7a1d096567c9aef7", @typed={0x14, 0x22, @ipv6=@loopback}]}, @nested={0x198, 0x63, [@typed={0xdc, 0x4a, @binary="96b3dd3b535d2d72484e748120fee94e21012e7de2036be4fb3d712504ddb7548ed0acf149ee5316463c7ddfee1be20957d0c3adab8d245d15d078864d63cc3d0f0409a4e0e5c1e4b1c42ceee8f13e755cfa2634fcd033eedc39841a673f69a946de67f50bd26690c02f88a4c2c64ecff47976a0f8bd67c8c0435f878b555dd0503fe2ecfcf68ee91f399a42397cb500e26e61b0ebb1f8ce6b2600d4912153108400d6e8635d1a399e907f5e1b708ffd0bbc5a7b2938387026bd5fd062ba0f5e60e4894725d970df203678fc6902a65d5cd43c781dab"}, @generic="46b3f531ab7a34fe4cbb559766df49bff7f10c51fd1c320337755331ead674461d6b0fd2f86a4175f1325941509c2d0520dd36037d9788f40af5b6c5d451f7c9bad84d6dae556d21b9fa838f", @generic="470b052353f719405ef344e3a2b826ddea9fe100bea20099e81ef471a9b8a123293636c7f7911fcf9025c1141f45d80e3d931b2c57e1ec593d39880a5ae598f2fdd2ad7c31fbd251e2d4898126a3821872af4df585842cc1a9d41c2bd0cf057e4d795b17aac9ba38a33e"]}, @generic="1987e39004533e5cf7e5218877437bc883e3945376288477ba05dc611b490e1db060e4c7efb3dc9ac68bf3eda17687f381cc199ffc4befcd91259b4088fb01f257e4e9010ba306f446634e9838044413c58f905398362808cadb6b0396222982c57e0741f35fc48dc360cc665efd43f95ef161ae828e5d440316a3b8392b37f88933491bbe8b973c4dd7b6522590da9b3794120978063bf3e0095e638a2fe0d74912db8850716ded02efa878e7c68459750560a2", @nested={0x10ec, 0x96, [@typed={0x8, 0x62, @fd=r0}, @generic="68b6836e6015724cb8205db1153c2b41300e5a6cb76a0dc5c993306ff7b259e84f60218fc6d26f79bac955f08e3b11688d84916d82c7b8f42d1a4fc6ffa87a7606c93dace3921176fe38a8bdf23c2f9a6c411bafab3f4bfb71bfced8908fc4e0634cbac91155e1834120144f9376a3e9957f6d63426f445a498d5dfe83d6442b6275da2375f8f7804004229b4ddc82a94646bcf9e9eff60b93fab7546cc7495bda5f6bda7e86879dff1d98c1527a351dc16b88c1d9277c32cf181e0d53f017536276884181511069", @typed={0x8, 0x83, @ipv4=@remote}, @typed={0x8, 0x45, @pid=r3}, @typed={0x8, 0x29, @pid=r4}, @generic="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"]}]}, 0x1448}, {&(0x7f0000001740)={0x540, 0x1f, 0x100, 0x70bd26, 0x25dfdbff, "", [@typed={0x8, 0x11, @fd=r1}, @nested={0x8, 0x22, [@typed={0x4, 0x47}]}, @nested={0x4, 0x19}, @nested={0x24, 0x5e, [@typed={0x8, 0x64, @pid=r5}, @typed={0x8, 0x4b, @uid=r6}, @typed={0x8, 0x3f, @ipv4=@multicast2}, @typed={0x8, 0x7a, @ipv4=@dev={0xac, 0x14, 0x14, 0x21}}]}, @nested={0x44c, 0x5b, [@typed={0x4, 0x92}, @generic="258d866c19171ea387f568a018749e386afec02aa6ed3d5d29ebb095384db5d5d74f9fd05cda8791b18239b1827145dda22dc0b62d656ecfcd5c4bcc121301b64b7f98cbc26c367d4b5ea482caaf862eb6c30e5fce9e15db3ee1a888234ff9e715f69ffff8ee917f6b88464470d6a9ed38d0dd669873376c95b6eef62f97d857", @typed={0x54, 0x17, @binary="9524985afd20a122ad451286ff973aba25b18a92dc4f52a6e729c2e47799e0ff93857f07928cbf44cefeb14dc6d288ac641c853c4c15d45a1762fdcfcbecf635df048cdef4a62f76b672c6cdf0ab1c"}, @generic="1054825ebae527324cb694ae12a7cba6e74cd72180cdb2bb875600b0ae935e30233b781dbbc85215595b2794a77ae22511a3076a50db87c00b5e8111846daa5467f079af15761da983796f2faf1b3b47afeeaed6811b3316e4d0565c118500f727aa553bed7a2f3cb0573462d89c3fdaad33280e96552e70fb1abdb55dc51a24be90031c696e9d9d1b74ecb6df7a04dee76df5befd960e52776aa7b8ca7184073c7d21ee14fdc79b3eece4911e20544005c4299ae4990f5da6988e4c962b99ecd5c31c931eb940df3d18059cc8e5363a1847becc818c987049bae149340deaf041bee94992296286740e92143ebb51aad3176e2e", @generic="6918073b259e643f9b204764df166e48d0669fa8512943efcda51a4a7f59f864b03297790f260cee1099c873bb18f20c176ea7da2ec2502352b040a286ccf15beea1d3bf931929fe4eb6a2c1b77f2f41fb18245c532517ee93ac66d36644a6607d22291d54586199c844ff975b038728a4bf8591c52e04328a8bfe6d69ba44f68119d91941b7d208c0003aba9428ad73d1f7f1835ecdd263538fbd502ec356abfac6062582ef2c30d9b6370cc61ad7", @typed={0x4, 0x5f}, @typed={0xa8, 0x64, @binary="31210a8c855df55c50cf8ca9043c111745b1c8a398d17c61bdcf1c1e1fc08ec017df1e500ee6bdc56f1d17dbd20126b90bb6d829119c4fe20560cf1b2afd8843d693a91ceb22fd9061b9182f89824f753489d8f51e670501c4b35b576637e30c4ff4795f816a9d2640222694a931590eb9926e182b543300e6f1be65347a62da276da88efd5676e1e45359be6dc0b6c8f92d8a2cab48f02e36a208c909d07821bf0cff"}, @generic="8e4c6cd9ad33b6d830fb240881151c201829b642affbc0363f598d3456c5041b29310d5a50dd406dc1bb9af8196307a50a70af6e7e30790307cc7726cb43096c66a4e0ff2f733536d49d2a73dfc8640d8de24eed02715b56b5de3b33df0cffa52b524bb61cee9cfd0f4de20ccf3eb494f34a8ac1cba767b999d6316a7058a7b53aebff5aea900ad59f08c4f6c78b46cce353d4c29581828acb973e13f3564a00b04da9a09fbb00bc1ba99717996e458506979fbe5fb0bdd5197a0f215e9b12b186bf42a3", @generic="03ffc8438a0dc01e4deb29beb06ce176f26667f9a9d42c0175e65d626d65cdf749b81e2cd241bffd2bc5ab904d6b60fa925f1b07944dd1918b5f5e770709a8725af9bb108cb11a33ae1e87b01c0b45acc5fe3dea34a14a89d7380a36"]}, @typed={0x8, 0x8b, @uid=r7}, @generic="8ccc281fbb0bd3311770b00c055d2159918a8e3637f3b8de5fc010140af3ad88022085b910c5bfdd7a68607048ccd0f508ddb5e156a20d0af849bca1be5cb8bc2ac5876c3984fa2da8d5789097f920f0b58cc5cc399eacfe980ce7ba7174c68f24dbc5074ea1bd5d94211c2ab840083af3b15f4dcaa2a31fcc3be257662c6864ecceec5f2cd7c4f76c8f13438f5ec10f34eac417a861da1ba6db125a47d58b3ee29cac"]}, 0x540}, {&(0x7f0000001c80)={0x290, 0x1e, 0x100, 0x70bd2d, 0x25dfdbfb, "", [@nested={0x44, 0x40, [@typed={0x8, 0x2, @pid=r8}, @generic="84d0d55ea9d7b1b47606d4b8d0584dcd9fbdd71ffbf432e5d138ca20fe246ee2edde6ccc6ee6ba68e4549c801744155a0515", @typed={0x4, 0x63}]}, @nested={0x170, 0x78, [@typed={0x8, 0x88, @fd=r1}, @generic="be427a12ed678ac3f9a39a6dca99aa1163c99950da6f0615af02b96b0f3d8d31bf3292fe9304c704990e795890c76c56278a2af03f1967110b26ee36a874e621e6d9b9003b2dadbd03c07467e1d52fa53802ff42599ae158b3bf866d1832d3d01e86a41eca9c306baca67a129d79", @typed={0x24, 0xd, @binary="e88a2fe61ddc570ec9ae34eb8410271de6799e008d5ded884ce52924a64b4534"}, @typed={0x8, 0x26, @fd=r0}, @typed={0xc0, 0x82, @binary="73de1eaad3bd4b0a806ff9930f15b928a6dc6dcd61a4854f42851a3a8c61c22a2f8a56f7f23fe36b0db289fc19da47b5fb436fa4146516a6e564746561e463e5eb6dc0fe74dcd527b2142d6c39f1f73d9e30ff70e7df0393ac38821f940811c45db7d2f6f2d3fef14ee1be276ac5bd47e4eab45339892b2ad4d43c6b1696e119fee8514d0a6636de744a1b7eb6b220fee0b5c061e4f8f8c7d11c3bf82956fce8426c93cac5fa0a28266330bd34b2cb3783eee455e467a4d9a16f"}, @typed={0x8, 0x48, @fd=r0}]}, @generic="d8402537120bbd6aa558ab9f2d27ba6d862dd045a15be36c7ce98fb6828c426dbc3f02a457409698e039ab32f4c7496a116f9340f8874d284607b85beff07afae72c3102e52d88137aa537f6c60caed9f2e592ca41699b549bc5534e8b9f348b4da09972d86c15f18caabb1908cde16bc666c9d8eda596d02afe04d713849fd14f3d72888637c054423b52b77089600f5af78773d644eba56e4373e8cfc935aca25083587e14c7ede2fc28d7d11a60b5ebd0baae2d0e252ea29b816bcb984fe3303fc22e17268a2654"]}, 0x290}, {&(0x7f0000001fc0)={0x1ec, 0x10, 0x520, 0x70bd27, 0x25dfdbfe, "", [@generic="d1fa56dec32e011c3fbec4ea7c54dc5adb70825703ae3028a485e369c963e7ba7dc8d97814912f829bdf468ecc79ac1b06ee1541055355a38ff1b03900707cb36a862c6f3bd1e338ed8c8ea8a11dd1f600592b5b1d47cdacd6258c20e5a78ea744a05f1c54f84d98c00435f9cec17c1579e71ec0a91d4af93ed29bc75171c73f9aff365a9d3d72d3e0bf5413151daff824beb2ffcf9c27c21c8d16ff3cef0f94424f897e7ac72159fc8a2dd46a8fc9f11b82ecfd134c4ab1414a744f84ef286b", @typed={0x8, 0x40, @u32=0x2}, @nested={0x114, 0x65, [@generic="30aef5c995b32790fc897011c2deea4559dd251c42b19da1f328832a83bfd750de1e817930c2db789ac4db2372fdb271532f420de58ae83bc01325a819b5707847f015502818c6f207637001978275aeec19483dad0339337bf977f447f0e47fd83e559d96e8142f45122947bfe86d55ebbb6226d4ac709e38f7a7bfc0c78dd2", @typed={0x4, 0x29}, @generic="ea55f826ccc6b9505ec9c2aca3edc5e8bea380fc92c1b7d5cb8a3c93ad007ccb15098390746b96db95cf3ad7e9a4c7a809be2485b1f0f1ac0bdb46d75482b20c0711e76821117a6fd79cf820ff181f093807c650229432841e4199d8a0983ce07fff9c25889b432afad1639cd8865bedab7cc4318c77475d5e", @typed={0x8, 0x70, @uid=r9}, @typed={0x8, 0x10, @ipv4=@local}]}]}, 0x1ec}, {&(0x7f00000021c0)={0x900, 0x25, 0x0, 0x70bd26, 0x25dfdbfb, "", [@nested={0x53c, 0x2f, [@generic="2eb88eed67ff7dac5747cc6e15056a7a064c365bafef006da53695587a7ac7470acd54033e699fa6aabf2ee6a6a7c67dfb26a8dbff8652bd70875f9e69a3be212ec889dc91466de2b3b8e0e14a8e92c8725af22f3fcc0c768a1c2c1898b0cd16d0dd92363cf22c05157a0044def1c24bd1a01d10d7315550abdcf57b", @generic="07292213832ba83e2cedb8750f65b1d98c2c9546b8bf1c540307c842", @generic="5045c75fe3d2df6bd8a8d0716464239a7985980fd66fb946af00c199742ab135f95c2e75a79a4b4b35aa5bf20dc77e6dc4ddcb18ee0461037c4710f8010ebf3875dea0e5e178deb703ef097aea3cbb6d20c732a5132b6a15dfcc9dccb96c7f5cc04c3a199bcc5005b1b7bdf5b6093ae82c76ec407a6dd8ac595bd273", @typed={0x14, 0x88, @ipv6}, @generic="1e665734f3158b222e4051b6afbdcfe8b7a5b8cee168daa3a43f5e4c78ce42d2c0af78645caa229230600c524033872bf166e41a7e098c3f66a1e214bea44acc28b2152cc8f5df40179d7ba492dee7673b4eadb57d29baf29060e59ea92589d3ee6a28b77d753661dd0fd40ea493932513843bc9b510a24ed839337ea7daf783035b041d7047db825b0ce44eaa81e12c61e5cffafe3048bf6ff87b3761506e25474b641b5d41d5a305ca2a4c57524691c4141f42ee4561d6ec1706236a3c830e611a96414457b67778857ab5bf36038c2f038580e668f22ace7e998758c05b91cf5831b3dcbb99cd134859eafb25", @generic="32d4449a397d4397a4f4bc4b52c293ef173f07ed42912ac5cd3d85d38559e0c01bee9724339e32fb798a208481c6eafb7f3971c542579064cec4df5540fa6428d407a851d8d8da211ec70bcfec8acff85f7be985f810d976c251d2142b4a8061812d90f40fffad941bdbe5433988a79522f4557bfb25e09b6c606bf0669510328dd4cb759fa4ffebbaa01a7c87464c06f4ceca5b7e82fc400879008a1e6514b01bf3b4ea8718b9149249d67aaf965c2ca6c4c0bd4902e9dd7fcfac8db2fb4a1bc3fdae38656af7b789f5d38b8440fe07d479d11b7a71f61ca5d722786d444c51c7b61292891e165b4b65e68e670774f193", @generic="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", @generic="e5275a6e0b7a223f990f677094695ac08e2450432b70f97b759a30a57dc9406a1567a782dcefd9a0fbebf7663745bbe2fb9f88694ef1ad37bf7035bca1c4d52a401bcf33435bfd86f46c2a8c4fbed7507dbdc5aa16", @generic="ae3c605be2efebd51bdc51cbe091b9861c19ef45c3ef22ef76a928520b5cbd4a4a41c727beae15987d58747443bb0ee6f2c7d6fa14da84d651d95344b22da77807570c69fd1dbf85bfb61914e60398e4d90e193497622ac75343084f7252f22802dccdd8d3aa982dd49445e4c135abf0f53063ef564d0ff4553ccba9775d4b32757a153c09acf49f2fd73d1058d7ffaa2e0ee06626b877890ff019c86eb103a7a61422ad6ab048510df8ad63bb0a52a951ae9d6284a0639b0acfaf7228200c6b1514befdccc00f1f814b6e532c09efc928024c2bf0988c3e194dcd127a9479"]}, @generic="7038643f1934b3171afa606b96845a37de7909f28c8c3dd2a4ee499ea7626c82d431014051fe717829c5ab1773fcbfe595e351e7e9f53bc9153bda553f4d2b3cc070ec86a9d3327e212ee83cf8c34283d52be253adec10fa2457ec4ffabbdb7a8a66cedfd75b3209c5b989f7548c1806a82cfca184be1bf1c996861335b6af6a1c1723b29439", @generic="ce68c8e0e89d68078cd62c", @typed={0x8, 0x8e, @u32}, @typed={0x8, 0x5b, @fd=r1}, @nested={0xb0, 0x62, [@typed={0x8, 0x89, @fd=r1}, @typed={0x8, 0x47, @uid=r10}, @generic="589ee2e06c4c5a2d6ee1f68489f04b66ac57b49a77a27eb04247ca77d5d0779b6a626bc3aae576cc0d42fa19d216a5dc07b93dbc935b801f1169daa51a8be782b76394d6e44490bbba0257a7cec1b14871b39741b0686bdd4072d4f2689a5b01e023c2bb5435a593e996f08b12ac9252fe5de34cf22ab4f63a3923a2f7b6a769a573bbe76f1f9574b834773f76efb87eed08df2d67b3e9d6ee27"]}, @generic="24a6305519f7b4dbee4dd702c978628a1be876a09a6dbda928409951d09fafdf0746a20ae3e07c162b26122b2a648fc63bebc49f5cd32af1f73451946618907958dc13579e68406e2b7fdd4a75ca8189543bdbba9c8f0114e0715daac79c9cd97ce7afb6adc2d4fa9d8ff7abec55ccec7f7e4b6eede4c6a1a1f84a239f45e6dbd60040bbe9235d12d4edb126bc5d068082c417ca429f7b1b82e421fb1c22613f8b8e2eebf7d3052b455e28c5268b8810cbd43990af11f891ee973a0d69a0ba2c6f254c5241620a69d174d7f35530d2be29aa7b822b9115e85d", @typed={0x8, 0x6b, @fd=r0}, @nested={0x180, 0x7e, [@generic="5b0737d0dc1cbc8db547dbb619cef012f049697c44bbc0acce76055a4c4370fb37071a76a5a1cd43bd5ff2624997e75e5cb37204deb269b0a897ff678ec48d90109c66b019d588050e645324e954aeff8f7219e8d8d599802b1741f1f02c0ff07e5f58303846616322c9667f0cf5511df67e2bd9f9f7ab6626872815280c14e3b3c08c102166dfb8903dc27e789413f4e2a218a182aa259b20ec0c43978bb904c33e19ddc555b6a52135", @typed={0x8, 0x6a, @ipv4=@local}, @generic="b66f7c5594539ca4645d3c1e27eef8e770801ea2faee6eafb93f606e2d662dd872907d45eb1b061b03ee29ab78d5d1a406dbd9ace882b71fbdcc06a236c415ddeeef3cfa5f2a33b1b505b53221874189a808bd5147a6b5ed4466c5e7eeba8740b19271f9d896701c2698e1b2fab1edf853015d36e2e39abe176363d1631b56c9638997f305864be08773710945", @generic="96b6a3d34bf5a2c7e83088c644cf558c9070742dfac7dc1ecbee767f2b97d5e0b5c6e8de0017e0173216caa2068985513e153f11173e82d66eb4a8"]}]}, 0x900}, {&(0x7f0000002ac0)={0xc0, 0x14, 0x300, 0x70bd27, 0x25dfdbfe, "", [@typed={0xc, 0x11, @u64=0x4}, @generic="4a7d1b1b2d3563bdf6144cb555638038c0d3e8beb236471db7845cc7f1fd64400037b805d6a5a5a9457abc32f1995a05862be0ed79d51abc39321e3d353fa561eac900abb891bac764edae9a99a8747cc44d89674d8e577d6a0abedf80254fd3164541c15072395cae3403af6f6bdc78cd7690bb284a3751a9245f9112a3dabde0c450d747032f5a5e6b2fabbad7f0efe9218c7cdf9e825a7871f519734137c3a3ee1c"]}, 0xc0}, {&(0x7f0000002bc0)={0x464, 0x1d, 0x200, 0x70bd26, 0x25dfdbfb, "", [@generic="fb6f52958d833dee384d5a5013691ee519ab2a5394fb75327360d56a34ca671a164555e3440c000eb65586f489bc602a6b2003a30955c022df4d2957a38816d30667b3d960a967cd09118be6ef22aad64b537396c7e0c07bccc24bb49e2e3ffec1b8a9e2ad443fac72f0fe1247f4c1c3c9273c855d39823d3aab85ad4ee72944816f23fab5dc263f62d5c1f9aa2428e2de700e4860e89a65c6a508e7bd1147240512da45c7f9c09f117c2589ad10356c2fb937e2b97b512ff11e1f251bd93ba4f6e800bdc7cfef0f7b972ea7c8e78b3d26a9eb0a0b340a53b163da95bcf68c", @generic="bc8c719773d01f4c24f73c79d610a484a0d95824dec3d02dbca4ca372a257a1e609da58c3f8fe65531bc65116e3191e968a697ebb920d1d30b72b3773b81016f748edc2cef7ab8bf405ddda6d4addf1a81eb99e8df4c04591d6e241282a5fac1ad93137e83bbe9bb6bf5451908416bdb4768a0488768e5ea29befcbac4b05fd1a4b2ac07f1d7b94e98ba684641a6a13a4d", @nested={0x17c, 0x1, [@typed={0xfc, 0x37, @binary="e612e44e7e510904b722c24fa24b41f4479e39d46443273f431013d4cc3f75344fba292640a791f906d63c5af8fc4c5688910fe0658ae4c93a42d45ee128343783208b7824ac46ba281dcb03bdf7faed2c45ba3d8f9192e737f6b764b26ef9e3a4ed5ad757590a7ff3a5dfe839f67c555351459bf80e82ba976016bdfd878d278d333c09357140c8e64ec555b247c9ebd0a28a2fee9d2a6246789418c204021a65dba9c3fb5cd504b761a0f2cf064d2208eefaf60401ccc316c30f6ae7781612571b64bc8fb15bd219c5e6d3c8d8cbce67cf80889cb27df903b1be71d5ebde37c0b5403b3c271ba0de5c892439ae213965388fb8cc"}, @typed={0x8, 0x4c, @fd=r1}, @generic="6637361ae9f58736d9a14fd4333c3cf20768dd0a1fd59cb04cb20ffe592a20c386eefd8b9783aa9bacfff0011106dec46fe790babe801f073c3cf9c8789022285a4ca892627f59bc1baa71722ea639c70bd58b3b9841c6b89a1d394f0206b4e7b3ba75c5a70400c49a085ea94af5419568a12e"]}, @generic="24b033b71b67cf76ce490943eee95198f97678d8bc18ac5262240eade5bfcf4f821c8136d96767d032f8d5286788ef639e23f70f56cbc8b53e80f1e82d55481d2c63677a1d425413f1337dd7dc679b64e8c20b56dae384d70987c7dc814c3726837854185bb5bc003cedad21ae8aec196409c0a5fe0893c1b3efb4639ca24ed1", @generic="9d9cf22479ed9573597d40726ee2b77afb96d0a27963f185e9dc30db97899bb55c5c388f9f31820b0fa948e6663d3cf8d41af5e882e81d7e4b9f5c5c3b3656a39ed7aa4fa9c0470bb08e31f50c8e69c4cf4267a1623af93409149a768e033ae9109084577d25", @nested={0x80, 0x6f, [@typed={0x8, 0x11, @pid=r11}, @generic="61a704c2607821fc893fad77b0dc582ed27e30beaf7921aab05cdda325760e6bc8d5028bd20c7a", @typed={0x8, 0x1e, @u32=0xffffffff00000001}, @generic="25a00c988a70dbd335315723dfbdcd6e87f00cffb5386e3c7e5861704f33e40d1f8e0c7bc890c2cf118cd9cb423fe8fd40eceed9170f67271f05dc690cda0ad9b257bc0f"]}]}, 0x464}, {&(0x7f0000003040)={0x11d4, 0x2e, 0x4, 0x70bd29, 0x25dfdbff, "", [@typed={0x8, 0x8b, @ipv4=@multicast2}, @typed={0x8, 0x7c, @u32=0x5}, @generic="06583c291a3094d03523bf10381e2afbe68075e478dc040f3a077645186c087a28139ea9b490189e5c6dd5a1306a23fe90fec5dcdc38e4c4c0936f2cf2ae1bac839a9730c4098dbe02aa9af2e60c7f950983177d3e2bd06a1fb2", @nested={0x8, 0x2b, [@typed={0x4, 0x11}]}, @typed={0x4, 0x8e}, @nested={0x130, 0x8a, [@generic="50bf6525d68c147e008207624018b0157b84fe3a67367439b8f6e25359e18adafb249de4563a1543a421bfd577ceda480b4b905f81b31b28ad4f911e94a95b011ca750ce72e5c4027f98568bbe29d37863a5d38ff0d7adf7f20e631b6ea308996bcbf99fdd4ffbc53e9e0aa5389e62b1a870d78a3ee6d0f1cea43ac99a27b37ac239812cf506e804ae90ff746a62fcce19382891e9127373", @typed={0x8, 0x78, @pid=r12}, @generic="e90acb18a44b61ba17bf5f5b8b0d9aff961a9a7a3939717463f1157b3b9cf60213c0d79004dffe7641eac8193d8569dbd13fd9ba1c16d61f13e0f941565ee81172134b2c839f5cf21977920d3fb971db6fb35255a65da07908a967be9270a5025627638436fe28493b90ce9b087c865b83327f527f6e9557707050", @typed={0x8, 0x62, @u32=0x3}, @typed={0x8, 0x66, @u32=0x8}]}, @typed={0x8, 0x29, @fd=r1}, @typed={0x8, 0x62, @u32=0x1000}, @generic="cb46ae2ca7cb739b88611ed3c54395729283c566d953eaabdd0533347b1c6307a8ee9595b5906596b9ae60b39eb6c7a3656af363c07a6d1bcf1df86cd6af0550d46ed6d8f2eb7f4ef8d72c8ed303b96e1dce6426a0ba440616ff200ed7fc573f659aa5f7fd961920d5acb38db0b0aef57c01fefd652a8d9ed515814ef7fc5b4fe9f1c099af349900fb013768814f5c46235197202611278a2512ad5fd9102510bcffbd9c3eb960ef19c37863b802da34902f8d8b21600d78d55a6cae1d289ded57278dc3bc2bf3d682b5a7871290df9bb0be7e4fd8b409a6162114f2474199a980d8d365d1e53626f7533e4da285f7dbe46595ad2f6dcba2597316e86cf32deed2a71189c960a08143b471046a3e1ac251e1c1322be132a910c21914b5199d77fc6d7eea03bea924c120a955f4509331e1f1fae126151219b2e15bb045bd4a71fe66869bb38eec52e0d19c91c3616d2e234cd17cac82db56fbefca3bf2ef715c77b63930203f989401dc3dbe197d34f6a1164215ce87d400f0c67b57c87a4bd6a9f7c4387e921f9387dac4114d6b67bd4cb80bf9c1411dac746fd7f8e04f4edd22a5666649af39c574c4a85adac31bf129614b1e565579c04aa4d112634e1c75afc968fe00845223f410f663b030e9747e5b078c39fd15bcefc03a1063e3cfb856ccd5546fec9403e86d80fd04ba54e4d604783058eb5dc933370cb02911394a318ac2352738163361ece4bcebc21b917308a53ad205f16f1c4b31f860ee719a15d14f568a9b528307e7a3d6cdf7e4185510862786517f578ca9e27e35649f2daa6c96e3d0dbeca23896df0b8caae85a32c8cac165a8be22c36234796a6d033975d27979471f1d64b71ac38f7e886104e03c1d12830beb76993511b8da7c85dde537abf8a5341e8dae517a190d8f1db0409d5b84b3ecaeefb07f469ac053bb3b2c2291fee5408f1683a0feaafc99bd6cab87cb07208eb650c495d280563202808cce5948b470754e6cfd3282c311449976aec7ce288d232839755fed5f0b80d3653ff4b6c1d3fe11bd2728bc60bf2af30aedecfb659676ba1595cd5a0e2acb11e493a0b6e9b9da768cab9bc4b20346c979bf16e49634b0eb8dcd9a02e588b072b901cc6265c6db7424c3d343883f8921599321280b944269a41bdaea1866a165f12876580cbc7777aacbf684042d408393401ac6509c7e45164f7f4cffb998bb0144529422052901d734669fb8852f551b3604a45a7ac92e26d12f78a81bff5e715f2721d12c2fac97438a05086eae67cfdf18d10db74dd16e0a02c0d758011b16c7380e139f3f8ec14d100afc2e81df88fe9f3d80c0978b054ddcf19a6df63522e4b7ec47b923b82d0253ecfe8b28a496cee428d088706614e855fafc0ee8ed913be746614820aa03fd86ac58c7c9cc8c7139b6f8df7f72809420090baf9c4d99715336ab9f5beb7ebeefa71d291cf4732fb2f60c6279251b5ebefe13cf78f692e1bd1668e958a4fc83304b33cefc2fcec08e05607b83ca355ed4362658f8dfee2ee79014a0982ad62418dfa56d4b78696958cf436a86abafb77c1f953d77710e567541fe67cfdf31fa0b6a0e1a4a0cc3a77f25991374464d082cc78d2a1f45266b8d8f40acfdd015caa8fc708d34546ff886ae725183bc5679c1bf69a89c59d465c3e8adf95a86674e168e6ac0b234e4e1889db7d1c202f1f5c77b77ff68f7b10177e75d9d254fa5c8dd5a79fc72d77240f63af7322fbced3eba2e6883680ddc42c68a5def161fb88f01638a19be298aecc09a320f38d1294a9747001403f5ef1d6f1ef687f502137f3f1ca3c91b47d4657874c561ef2080513e46da20a9a8c3cd78676781b0e6234de082105768efa45ab0e6a38b12911a5b719056b3a2626ec3764fd85f8c40f15e1b35f6514b02cddb294d278b5baec0a47f2609707f300c092041891ee112574a7b2e23dc06f030243a0c76af525cadccfdf0f3be8d030d8f0ae4ec7487980a204cb407164c78d8479399238215a2ecefb4c16311f2257ce650936beac92e884cfdc6ecaa2b2f99ee2b14842c3f70d5e79a1548037bb4783675aaa2e1d3993757957f00a754832db5a5d16127cc4c20d5418676785ae4369962c86727dfc6ff7744c39d17ea37edf414d441abc08429ba4fd9bb8c35d5f0c3fad339729ef91f3a54937682f38bf48e5aefdf8d12fb50ef70da8a99fe3e2b8c51bf2ee8191c22d43d3cd102c54077a8f549f0d8e8c5ce7848dc90f845f92b8ba0112fc336158ea008ca5820802ed3a8796e2f58d10dd5116726e5939ee5742111d5ec8276da6cb04b9c502665f260be002da40343fc7116488ffe9cd299d2ee3aa3f6ce534fdfde1730bff0ee5bc39b956a606f3fbdf7df57730dfff63aa6c0d8a73abbacecc605ce5a2eaf895c8fd5b594fdf19578e5046c9303631b3a850f2f297b530c716ae152a92f930f3f5bf75b0fbe172720a1641f22a91fec7beebb45e57e5ff7e116c9d1b113aacccadcbd47d419ebe33540c136ae6b3970be9db1dcc1ce9c3128d33f49b9996ec019b67960b2a5fb748fefe6b6cb93de79a48d6b75b78c05dcb8c32d4ae9d6fc71707f22c749f15ea4065bdd02a6bf3a10a1823d32523806f7a055d0dbd3f64f21d0e5eb26d32167955f6026e808de5b166f4b42c770f6245be58c152d0bef00da724aec96d636dca3f72baaf626bdf9cf29bfd82668ae55e9664a519859e6668b76f383d5dd2f085f6eab516f6ee362535d1e3aeb6ec9edb0311b12154dc45902c415d00dff3295696c90452bd8cbaddf9565af163eb2df04edc261338f6f0a544c5ec01ba5d9ceafb93e68d24568bc961ccf66dc488346af3141ed192639f698c5c3825568689401e4d1cb8a35c306cf49b02d51b2bfe3196b823d882358976809adc8c661ee0d0c070f6e5491bc1522394f2c2303937995ace78466b673e762a75a323dd7de5851fd8e05b4c06231e0a70ae1eb2e70d024a47e9fa19fbdaa72fe95961174fdf98b205ba4a997602b251293e0bf6045bf61b49ab4ba5e8bd1e70afda631a7fe0920abd5fdefb8a5ee3f06fe9cacc4bf50f8c5cb69e6c729823a46d1b5221640971bb8de932e29512c60b602949405a1651eee0eb31bc78e6391260598a91ac69bfb85438338fae1623e76e627a5fa82a96fd61ddce27cff30a0405466dcbb41f5db75030bf0312b41a4273b996311742d1e8f985598923656185ab865d03db7c303a7109861262530303e859b2a8f241481c8e99f25b9e44c635e1e66c24fa3545bff70eed08b8774d1ee18dcf242b5fa7f77e861178424cc557e31ab3be21aba99361006a610d65f6351639f18bb37d63a68c75fb6c86a2ffbbd6552b5051954066466b54d0cd82e690fb07258df102f225e60a45e43052045dc8bf492645cba4f509b50804d3d04767475735dbeacdbc2e4d91fe6c5b4165fbe29c6e59e22645754a2cd0fa6023923bc8403085b1d37377089ba67247973fc46a22967b66c37c57e14f7bcf923a5d3dd69cd089f3f2181889b718e28fbbcd588627cfedcd625a09a8013029f75ce5960187ace8b102b5c26c79b64d798b7b897aa1076931ad49bc9e007c47bf489b33795a4d39a2a67f41eb925e6257f27f4460f939b5c248e81120e1578f067c4e2c90e35a5742ea7421e61a37e4096dcc030af3482cb1164b3bddfbba78041bbe924e40df4bf28caebdb24292cdf066e2426d3b808815038ba0b33529479ce3a78acebb60575e833c088a2eed8a5a4413716d876d346ed1c3731cdb5361b5927599508aff725def16636d40207f335a0abd0a7b24b3c17fed950e98de049f695bd6a9f14f4566f4708d5f3436dcd517438b95396770654a85892153351c7509e8690276189ad75cdec6033ce5547cb0aafd1839b7406a85fcd56858a2933173ac2d4240f41bd2ccfea6b0467db2b21b0152a153b910f232be43bbaf5c5b603f86ebb2c3f1518f839c2a97dfccf52df86afb9cf3ebe993625ed37a1f220c788bd9dda6db48d1e0694649eeff19177210704372febf0e66a0a1d452951d5aa813a03fbc91246f7f82ff44c12774dddd65a16a18ab54bab822b71fc73854f521037adaac2fd472c96d201a4ab590c79c631989712ad05a9ca43333076737a5f19763050f3cbb989406c932093e5395be7aea58a41439111e07728773d7b12de5399f10e70c06e82125266a0b09f554a78f25323bc551a0eaa75ac6f8a405046fbba83e92bab7688357607b837737656e8957a1284b9c6e667c51e88b0b41c934b417f2544e15a20e16a44a6766c50dd4976f8ec9a0aad632183238d39130edd65456d992e1d96ae465a9b6df5211a3e2a003f10e494f58250beb7d7a139f5f2f7b2631986d7defebbb7ad88a8301b1b835d4600576b906343a72fe5b2f29007467b681db1fe770112c630e4e18e296d613ad2ae0c40a660cb93f9d553d6f342668a91ab465d4f7513774a2b225aabcf7a047dbc3d5e5a6cbb17e40fb9234a733da8fba7cdb72233500c6194d4f5b3103bdaa6df857596caeef42972db3b657b16d1d38a983502b9dbcc524da06a5b194d78bfc5c67841bfbbcd5d9af345192485f19e3ed9c1ca02426afd4f5e62e6f58733d15c5ffff263a46ca8d46d6d8fcf7e422a83c17bdfa4d7cefcf38ab8a75233f71126d7901d721ebabb2d3456b5477307e097018f601dab2a5816d0a7e05f529efec030a623ea569fedb0a047e96addb19066726e416b503c1eeba6f681c1fda783e6b4fade865e880e3313d163325546316b109829bd322e13334d8d1eb2b75ba67e58430d9a2cf601ead9a7452d66d0f5feed21599f998d3d76d12229d2c8164460ea05f7869b00aeec1d4222338d18dfeb71ca7c61011fb6d3004a9a6b7b42df2a92be9e8c3d6e528be6a99f344a3fd570f2cb6c8ff9e2403ce928193cd52d735d3fe3e085e54dc8c6d3f0bc6b50fa2382c30ea5d791bc7208f3ffbedf561d89b0ecdf6a9445759b74c2d8c2ff6bb783c427188832d0388c3cb9a7c8777e24cd6bc6538dbf1b0045396e9d96fbeb250581e7461230c4855b6bcd8aa12d39c62a9dec1b9d0a92589ae35621eddb1ad6872a6ca62e59615e572424179ed10057c314203854a9316ec4cf9fc28acd027cccc8c80f1bbff1a22e849f64afaca94d33cc75befc4b4055bc4c475b6b83f824f5d49beef154f4c864f70cf4e5702da6e1d992e3a4a95d5165deb0c71521852c2fca38c803b23e4989571c395da590d3193756022ec008300568c59151e0e7e35f912909bfb1526e52341a0f17016e1dede2b0982c3823f3b89413dd6b7fc666d9b9ba8f59f3fc3078eb207ec03670ceb760e01e7b60ef75cb2b2c3d73fc8851c456680e12bba0a70a706975e9fed91297093abee37627faaa68781e23df4851ae66a0c90d698c6e4de6a3cab6e374abeaccfa2806cdfe221f4eb0e6af261fd805045eb61de07590a7f8453c16750feb32e7295e0ad2c60a32c592b3e71c142bda849000dc2c782d624f874715bdc414a3a458e5813a7aacd063db55ab22b389e5345bd5dba875996c8df427bbbd22f6e5267abfd948f3e278053ef55fc222be0c5347d44ef4e57b3d0bd5318912c90913e4c5164f623a4c7d9d297f6cb2ecc23e29cf80bf60ee1b6452f6e343093c8d61b7d436a3eba754592cdb603d7dd1641bdb040937c6c561698ab63daf34960bc7c3beb215f5f4ab1c962d42b24d4e50b9292b5c7f7c80a549cc75c6a9ee3e687c5715069b5029f233f01908aa343daf8289", @typed={0xc, 0xc, @u64=0x7}]}, 0x11d4}], 0x8, &(0x7f00000043c0)=[@rights={0x30, 0x1, 0x1, [r1, r0, r1, r0, r0, r0, r1, r1]}, @cred={0x20, 0x1, 0x2, r13, r14, r15}], 0x50, 0x4000001}, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 18:37:59 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x4) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x40000000, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x3, 0x6, @random="d56392feeae1"}, 0x14) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) write$UHID_CREATE(r2, &(0x7f0000000300)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000180)=""/204, 0xcc, 0xff, 0xc26d, 0xae0, 0x400, 0x3}, 0x120) close(r0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'vcan0\x00', r1}) 18:37:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x2c, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:37:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'Qnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:37:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead\"blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:37:59 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x6, 0x10000) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000040)={0x1, 0x1}) 18:37:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x2400, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:38:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x7000000}], 0x4000000000001b7, 0x0, 0x0) 18:38:00 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000040)=[0x8, 0x1], 0x2, 0x2, 0x6, 0x7, 0x2, 0x312b188, {0x80000001, 0x4, 0xfffffffffffffff7, 0x1, 0x8001, 0x2, 0x6, 0x0, 0xfffffffffffffffc, 0x2, 0x4, 0x0, 0x9, 0x9, "88e6832e667424fff3de89f8911f4201e678a1c62cd9501e338378ad7e7a1380"}}) 18:38:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x2d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:38:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x6, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000000000001000000cbffb6ab68abae610000000000080000ffb04e188d20c0d16a23b23eaebea8b2"]) 18:38:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\x0enode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead,blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) [ 969.238651] QAT: Invalid ioctl [ 969.262015] EXT4-fs: 38 callbacks suppressed [ 969.262026] EXT4-fs (sda1): Unrecognized mount option "node_readahead_blks=0x0000000048000000" or missing value [ 969.307255] QAT: Invalid ioctl 18:38:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x400, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) r3 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x10001, 0x80) mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4, 0x10010, r0, 0x0) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x1) [ 969.379980] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_blks-0xffffffffffffffff" or missing value 18:38:00 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) r1 = syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x81, 0x400000) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000440)={0x6, 0x1, 0x2}) close(r1) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x3) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000380)={@remote, @rand_addr, 0x0}, &(0x7f00000003c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@ipv4={[], [], @initdev}, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000580)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000680)={0x0, @loopback, @empty}, &(0x7f00000006c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000700)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000840)={{{@in6=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@initdev}}, &(0x7f0000000940)=0xe8) getpeername$packet(r0, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000ac0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000b00)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002500)={0x0, @multicast2, @local}, &(0x7f0000000400)=0xc) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000004a00)={@initdev, 0x0}, &(0x7f0000004a40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000980)={{{@in6=@local, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000200)=0x257) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000004bc0)={@dev, @initdev, 0x0}, &(0x7f0000004c00)=0xc) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000004c40)={@empty, @local, 0x0}, &(0x7f0000004c80)=0xc) accept4$packet(r0, &(0x7f0000004cc0)={0x11, 0x0, 0x0}, &(0x7f0000004d00)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004e40)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000004f40)=0xe8) accept$packet(r0, &(0x7f0000004f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004fc0)=0x14) getsockname$packet(r0, &(0x7f00000050c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005100)=0x14) getpeername$packet(r0, &(0x7f0000005700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000005740)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000005780)={@loopback, 0x0}, &(0x7f00000057c0)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000006e00)={@empty, @rand_addr, 0x0}, &(0x7f0000006e40)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000006e80)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000006f80)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000006fc0)={0x0, @broadcast, @remote}, &(0x7f0000007000)=0xc) accept$packet(r0, &(0x7f0000007040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007080)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000007180)={@loopback, @broadcast, 0x0}, &(0x7f0000000240)=0x386) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000007200)={@initdev, @broadcast, 0x0}, &(0x7f0000007240)=0xc) getsockname$packet(r0, &(0x7f0000007280)={0x11, 0x0, 0x0}, &(0x7f00000072c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007a00)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000007b00)=0xe8) accept4$packet(r0, &(0x7f0000007b40)={0x11, 0x0, 0x0}, &(0x7f0000007b80)=0x14, 0x80000) getsockopt$inet6_mreq(r1, 0x29, 0x1d, &(0x7f0000007bc0)={@mcast1, 0x0}, &(0x7f0000007c00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000009180)={{{@in6=@initdev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000009280)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00000092c0)={@local, @empty, 0x0}, &(0x7f0000009300)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000093c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000009f40)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000009f00)={&(0x7f0000009400)={0xaec, r2, 0x2, 0x70bd27, 0x25dfdbff, {}, [{{0x8, 0x1, r3}, {0x4}}, {{0x8, 0x1, r4}, {0xf4, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r5}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xfff}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r7}, {0xf0, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xffffffff00000001}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}]}}, {{0x8, 0x1, r12}, {0x26c, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x7f}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7ff}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffff5e4}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r15}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r16}}, {0x8}}}]}}, {{0x8, 0x1, r17}, {0x100, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1000}}, {0x8, 0x6, r19}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r20}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}]}}, {{0x8, 0x1, r22}, {0x44, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r23}}}]}}, {{0x8, 0x1, r24}, {0x104, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r25}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x800}}, {0x8, 0x6, r26}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r27}, {0x1f0, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xffff}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x542}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r28}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r29}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}]}}, {{0x8, 0x1, r30}, {0x180, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r31}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x4, 0x80000001, 0x7f, 0x7}, {0x80000000, 0x100000000, 0xb1, 0x3}, {0x6, 0x10001, 0x776, 0x4}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x400}}, {0x8, 0x6, r32}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2c}}}]}}, {{0x8, 0x1, r33}, {0x7c, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r34}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r35}}}]}}]}, 0xaec}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) [ 969.451897] EXT4-fs (sda1): Unrecognized mount option "inode_readahead" or missing value [ 969.472909] audit: type=1400 audit(1546195080.522:89): avc: denied { map } for pid=5388 comm="syz-executor0" path="/dev/kvm" dev="devtmpfs" ino=15142 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:kvm_device_t:s0 tclass=chr_file permissive=1 [ 969.529593] EXT4-fs (sda1): Unrecognized mount option "node_readahead_blks=0x0000000048000000" or missing value 18:38:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffff04000000}}], [], 0x8cffffff00000000}) 18:38:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'[node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r2, 0xc0405519, &(0x7f00000000c0)={0x3, 0x0, 0x1f, 0x0, 'syz1\x00'}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000040)=ANY=[@ANYBLOB="010600000000914ab000632d68c8f6ad00010000000000783ed29e0000ffffff7f0000000000"]) 18:38:00 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x1000000, 0x4000) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x5, 0x0) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x8, 0x4000) ioctl$CAPI_GET_PROFILE(r1, 0xc0404309, &(0x7f0000000140)=0x8) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x3f) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x40400, 0x0) [ 969.654168] EXT4-fs (sda1): Unrecognized mount option "inode_readahead" or missing value [ 969.861008] EXT4-fs (sda1): Unrecognized mount option "[node_readahead_blks=0x0000000048000000" or missing value 18:38:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x1000000}], 0x4000000000001b7, 0x0, 0x0) 18:38:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_,lks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:38:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) 18:38:01 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) close(r0) 18:38:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffff0e000000}}], [], 0x8cffffff00000000}) 18:38:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\x06node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) [ 970.179915] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_" or missing value 18:38:01 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x400001000006, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x7, 0x0, 0x6, 0x6, 0x3f, 0x1f, 0x4, 0x40, 0x7, 0x1000, 0x81, 0x100, 0xaf1c, 0x593, 0x1, 0x1, 0x3ff, 0x4, 0x1f, 0x456, 0x8, 0x4, 0x4, 0x588, 0x9, 0x7e, 0x4, 0x1, 0x7, 0x1, 0x80000000, 0x3]}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x400, 0x0) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000140)={0x200, 'syz1\x00'}) 18:38:01 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x2000000000000000, 0x0, 0x7fffffff}]}) [ 970.287509] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_" or missing value 18:38:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_\"lks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) [ 970.390176] EXT4-fs (sda1): Unrecognized mount option "node_readahead_blks=0x0000000048000000" or missing value 18:38:01 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000040)=0x80) r1 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r1) 18:38:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x10000, 0x0) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x2) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x23) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB="0100000000ffffff7f00000000000000000000000000000000800000000000006e58496f7270d790931d55bb486187e92ca3d05b352e06fa6de1f23c1302787e7747e647c92fa2970500e94233a39af9f04a38e1bcd3bfde91e972ef93d153dae6ab94e90379c59e1448415d37754dcf3f2eef212a045902260861f602815f96fa2523c6"]) 18:38:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffff05000000}}], [], 0x8cffffff00000000}) [ 970.669986] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_"lks=0x0500000000000000" or missing value 18:38:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x700}], 0x4000000000001b7, 0x0, 0x0) 18:38:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'Ynode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:02 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_RESERVED(r0, 0x5601, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f0000000100)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xe8) r5 = getuid() fstat(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000280), &(0x7f0000000580), &(0x7f00000005c0)=0x0) r8 = getegid() lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x5, &(0x7f00000006c0)=[0x0, 0x0, 0xffffffffffffffff, 0x0, 0xee01]) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)=0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000010001000000000002000300", @ANYRES32=r2, @ANYBLOB="02000400", @ANYRES32=r3, @ANYBLOB="02000600", @ANYRES32=r4, @ANYBLOB="02000700", @ANYRES32=r5, @ANYBLOB="02000100", @ANYRES32=r6, @ANYBLOB="02000600", @ANYRES32=r7, @ANYBLOB="04000200000000000800b8fa", @ANYRES32=r8, @ANYBLOB="08000600", @ANYRES32=r9, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r10, @ANYBLOB="08000100", @ANYRES32=r11, @ANYBLOB="10000500000000002000010000000000"], 0x74, 0x2) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) close(r0) 18:38:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000040)={0x2, 0x0, 0x1}) r1 = getpid() tkill(r1, 0x33) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000300)='ext2\x00', &(0x7f0000000340)='./file0\x00', 0x4, 0x3, &(0x7f0000000500)=[{&(0x7f0000000380)="0223c49c29457361803a5034b2dd038a8fe57e38e58bb484dedd", 0x1a, 0x5}, {&(0x7f00000003c0)="4e9799a30787bdf435f2366cc4e561cbb1663843fd1bb8ea2cdc139794b012", 0x1f, 0x4}, {&(0x7f0000000400)="e05393950eba3086da13baa579bcfa7076e612340a4e7f1c660809fcb650ebe9bae6add2ca0e8f54751de68d5f3a841de69a7d62c06017c1d9f8206cddb09282abdab676701e30869ed6eff2d2287faceac5cbc93a6cf660c0cf5f7321906b09c41efc0970937899455199d9c034e60be2d7df76ebbd831f9f25fbd6fe25e7c5a72ad3f72ec1f48c011226ef71e263949096458b8fbdf783c16e03696cc24b117a56ffb1a345cc54f7e9aa308f875bd8f795dde548c3af52faf2d53843a8d66ae6ace1cabb456f8b9d2de912ead0577618847153dfaa4b359fe13b6f67c737e4c31b7a77b41ea2150d", 0xe9, 0x4}], 0x800, &(0x7f0000000800)=ANY=[@ANYBLOB='journal_checksum,debug,norecovery,nomblk_io_submit,data=writeback,norecovery,orlov,journal_checksum,minixdf,measure,obj_role=ppp0bdev,dont_appraise,fowner<', @ANYRESDEC=r3, @ANYBLOB="2c736d61636b6673666c6f6f723d2c65758b643e", @ANYRESDEC=r4, @ANYBLOB=',\x00']) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r6 = semget(0x1, 0x7, 0x4) semop(r6, &(0x7f00000002c0)=[{0x2, 0xe73, 0x800}, {0x0, 0x0, 0x800}, {0x4, 0x8, 0x1800}, {0x4, 0x300000000000, 0x800}, {0x0, 0x4, 0x1800}], 0x5) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x10000, 0x0) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="bc0742f9b4e397b4669a13e6ef26332d31a423f1188f7699589b56ac89e98f51580f969c9aba8b2984e1795adfab4e5d221ebccc96983c5e1dd4e6cf716310728f49405ce683b7daef64046d0ded9a7ad5a567313917647694e3c73658b09969ac7dfb28e44dcd5f25649f5edcca5a670ba0e62fcbcca852b71a292d4428fb6d202b1723744b307659f88abfa94a8150630db1fea8c029ea9716be621c7c599d9dcbbf394cebdbc7372d74", 0xab, 0xfffffffffffffffa) setsockopt$inet_sctp_SCTP_EVENTS(r7, 0x84, 0xb, &(0x7f00000000c0)={0x69, 0xfa1, 0x4, 0x401, 0x4, 0xffffffffffffff7f, 0x2, 0xfffffffffffffff8, 0xff, 0x101, 0x9}, 0xb) ioctl$KVM_SET_CPUID(r5, 0x4008ae8a, &(0x7f0000000140)=ANY=[@ANYBLOB="0100000000010000000003020000000000ffffff7f0000000000000000000000"]) r8 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000580)='/dev/rfkill\x00', 0x0, 0x0) write$cgroup_type(r7, &(0x7f0000000280)='threaded\x00', 0x9) connect$llc(r8, &(0x7f0000000900)={0x1a, 0x31d, 0xffffffffffffff14, 0x7, 0x20, 0xb2, @dev={[], 0x1e}}, 0x10) r9 = semget(0x2, 0x0, 0x200) semctl$IPC_RMID(r9, 0x0, 0x0) connect$tipc(r8, &(0x7f00000005c0)=@name={0x1e, 0x2, 0x2, {{0x40, 0x1}, 0x4}}, 0x10) 18:38:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_%lks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:38:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffff12000000}}], [], 0x8cffffff00000000}) 18:38:02 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000240)='/dev/vbi#\x00', 0x2, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000040)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000140)=0xe8) open_by_handle_at(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="3a0000000000010064c1a6d13538b655c4a67d44cc6de99127005d791fa10cfa43afbf0ccd4c368540f10ee3912f022a6c735b51942c3a726400"], 0x22400) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x3}, &(0x7f0000000480)=0xc) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000004c0)=ANY=[@ANYRES32=r3, @ANYBLOB="000003e6fe07f718500e"], 0xe) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000300)={{{@in=@loopback, @in6=@initdev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000000)=0xe8) symlinkat(&(0x7f0000000280)='./file0\x00', r1, &(0x7f0000000400)='./file0\x00') bind$bt_hci(r1, &(0x7f0000000180)={0x1f, r2, 0x3}, 0xc) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000440)={0x3, 0x100000000098f905, 0x801}) socket$isdn_base(0x22, 0x3, 0x0) close(r0) 18:38:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r3, &(0x7f000000a300)=[{{&(0x7f0000000e40)=@nfc_llcp, 0x80, &(0x7f0000004580)=[{&(0x7f0000000ec0)=""/92, 0x5c}, {&(0x7f0000000f40)=""/168, 0xa8}, {&(0x7f0000001000)=""/253, 0xfd}, {&(0x7f0000001100)=""/231, 0xe7}, {&(0x7f00000012c0)=""/90, 0x5a}], 0x5, &(0x7f0000008040)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000007fc0)) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:38:02 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) 18:38:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={',node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xe0ffffffffffffff}}], [], 0x8cffffff00000000}) 18:38:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_b*ks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:38:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x680e}], 0x4000000000001b7, 0x0, 0x0) 18:38:03 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f901}) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000040)=0x5cc34338, 0x4) close(r0) 18:38:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffff0000000e}}], [], 0x8cffffff00000000}) 18:38:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_b+ks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:38:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'Nnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:03 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x1, 0x2) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000140)={0x17, 0x91, &(0x7f0000000200)="c5863b2aea95d1d3bf8d62b40d31fd5af85d032c78aa1a8e5ad8164d5f4513f018600e726e690cf9e4aba6a2192d67ce76b8a0b93fa7e628ccdbb9700f4ac8be56808059ffdba1e2ae908994cb377030a1047dc2c8e9c58372c01a85f484d1443da70ff772ea475b126d92a4b1001614e92cfbc61c848bcd542d6e9621060f73d5168fc5d34caa299f8ce02b864dad5cb7"}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8200, 0x0) readlinkat(r2, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/71, 0x47) close(r0) 18:38:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000040), 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x80000, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000180)={0xb, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x6d, 0x9, 0x8, 0x8, 0x9, 0x8b, "343fa4584c00a0373b7203cec1f7189c7e465591d5b7551b30467699165e1b8e4e772720757cd0f4cd84cd8c8638db9ec85851198eca98b97f8a77bb544f1f82f8e2c8aa85cb6ca26f120499c4cf9d0089ce9875ebbf934ce56358c3132006836eb476608f75dbd18842a1e905"}, 0x185) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) 18:38:03 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x6, 0x100000000098f905, 0x80}) ioctl$int_out(r0, 0x5460, &(0x7f0000000000)) close(r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x400000, 0x5) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {r2, 0x1, 0x0, 0x0, 0x0, @in6={0xa, 0x4e22, 0x1, @mcast1, 0x305cfb74}, @ib={0x1b, 0x7f, 0x100000001, {"c7cb6ae240df0d3aacd757eb33b9ca62"}, 0xffffffffffffffff, 0x6, 0x89ce}}}, 0x118) 18:38:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_b,ks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:38:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)=ANY=[@ANYBLOB="01f9000000000000010000000000000000000000ffffff7f0000000000000000"]) 18:38:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffff00000004}}], [], 0x8cffffff00000000}) 18:38:03 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f00000000c0)={0x1, 0x1, &(0x7f0000000000)="834395e7d8a806a6948abacc3a11af5c2a48153eff25b6ce3e9c9ba3f988bcfeaf61e927e9b615fdb7afd55b77674c61c56c47fbbed3c938a087eb79177388dc93caee2d0cbefc66247ee5bb7d275be3ffc6f491200cb2ecaa8e2843dcc3174eb270a378f5a7f1d2b95e317bbb98c31b1dd1e4c800ae4742e038cdb98574ab397c53d33377b7078159e127f2c86294fd62160cf07565d3e606c1009e2d4aec1b2fdd039b8831a27440f61e5adb509aaae84e16ef", {0xb24, 0x1, 0x38414761, 0x2, 0x4, 0x48000000000000, 0xf, 0x6b2}}) socket$inet6(0xa, 0x800, 0x3) 18:38:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x10}], 0x4000000000001b7, 0x0, 0x0) 18:38:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'8node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffff00000005}}], [], 0x8cffffff00000000}) 18:38:04 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf02, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) close(r0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r5, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:38:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_b0ks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:38:04 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) write$binfmt_elf32(r0, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x8, 0x5524, 0xed67, 0x8, 0x2, 0x3, 0x0, 0x356, 0x38, 0x1dc, 0x0, 0xfffffffffffffc00, 0x20, 0x2, 0x7515, 0x7fffffff, 0x40}, [{0x70000007, 0x9, 0xbe2f, 0x3ff, 0x0, 0x5, 0x1, 0x1}, {0x60000006, 0x2, 0x9, 0x1, 0xe265, 0x20, 0x8, 0x26}], "139fdf3fc62c2f5ef4334cf977e0e8bd0ec7abf5a88153ddeb6736c5a46b8351bf6e9c89b14817fdf25d51f647a386213612b5a848f267cfad1e25109ad53cc11cf52e4a5a9f5013f340335bc6700d85f19d5c6260b764309fd727da5cfa89a85caf233afc217182776bbbc170789f64a665a9815caea65d14f94c5bf67ae20de3a966b1fd8506628863b98b937bf3862dd672b6d962cb"}, 0x10f) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000300)={0x7, 0x4, 0x1, {0xf, @vbi={0xfffffffffffffc00, 0x7, 0x9, 0x39757f5b, [0x7, 0x5], [0x100000000, 0x8001], 0x1}}}) close(r0) 18:38:04 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r0, 0x0, 0x20, 0xfffffffffffffffa, 0x1f}) close(r0) ioctl$VIDIOC_G_ENC_INDEX(r0, 0x8818564c, &(0x7f0000000300)) 18:38:04 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x8000000000a2000, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f00000000c0)={0x1, r1, 0x1}) 18:38:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_b\"ks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:38:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x1000, 0x101000) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000240)={[{0x6, 0x5, 0x9, 0x1, 0xcd, 0x0, 0x7ff, 0xffffffffffff8000, 0x6, 0x7, 0x800, 0x9, 0x2}, {0x6, 0x1, 0x6, 0x4, 0xfffffffffffffffb, 0xc92, 0x7, 0x2, 0x4b1, 0x100000001, 0x80000001, 0x3, 0x7}, {0x4, 0x1, 0x0, 0x8, 0xfff, 0xfffffffffffffffb, 0x0, 0x9, 0x8000, 0xfffffffffffffffa, 0x4, 0xce, 0x5}], 0x10001}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = syz_open_dev$cec(&(0x7f00000002c0)='/dev/cec#\x00', 0x3, 0x2) keyctl$session_to_parent(0x12) ioctl$EVIOCGBITSW(r3, 0x80404525, &(0x7f0000000180)=""/162) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000000080)=""/49) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:38:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffff01000000}}], [], 0x8cffffff00000000}) 18:38:04 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) read(r0, &(0x7f0000000000)=""/188, 0xbc) close(r0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)={0x67446698, 0x1, 0x1, 0x0, 0x2, "aec3fd178d828e6b9c1703101c7e6fcde8870a216cebdf907d5e308ee5a3e162dbc40c8b14f5171c21388c7e6dea70e1e966f453db38da9891fb06570655f8c03734cc97a5ca902c170c621c5747cb0449c2b0f043358c9f3f58d75085adaf4bad8c538bd2f7e6144947368608301382f8c7d2e950cb2e0fec77298e5dcfbaafb2de3b3e51bf2cd295c4ea608751141593ad88e5d49f5390ef3e9fbaf547755ad158148bd6006de4ec6acec44ddfffa117be4f7676f8903b24c3d618ed9bb1399a77402dc480c734931a7763a879e3ffdea4b18c0b121d94b3ec613625683d853ee544e425ed61026269a7e0"}, 0xfc) 18:38:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x700000000000000}], 0x4000000000001b7, 0x0, 0x0) 18:38:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'Lnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x2000000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:38:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_b#ks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:38:05 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000480)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800100}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x148, r2, 0x2, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x924}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffc}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0xc4, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x240000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xcb6c}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1d4}]}]}, @TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8001}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x20004810}, 0x20000000) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200d00, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r4, 0x800, 0x70bd2b, 0x25dfdbff, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4004) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) 18:38:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffff0000001c}}], [], 0x8cffffff00000000}) 18:38:05 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0xffffffffffffffff, 0x100000000098f904}) close(r0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x400, 0x10000) io_setup(0x6, &(0x7f0000000040)=0x0) io_submit(r2, 0x3, &(0x7f0000000280)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x1, r0, &(0x7f0000000080), 0x0, 0x771a4853, 0x0, 0x0, r1}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x7, 0x8, r1, &(0x7f0000000100)="1da4de9dab9c895e5e809838f4b3d7d9e4a984b0da332c379d24a70add18905d5d4ca138ce9023e942bc7378a3c36160137520b320d7d5dc5165c0ec3c7f0660a3176e5e2e964291b286491ad783c8a241361e60a05fa42a9ef7faa0c44743f467c2aeb3f7", 0x65, 0x1f, 0x0, 0x0, 0xffffffffffffff9c}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x7, 0x401, r0, &(0x7f0000000200)="f238a027f306ab8be220e40e5e0f1afb0981b1eede8297b868698a90a2b3545c0fd7304d0877cd55", 0x28, 0x1f5f, 0x0, 0x0, r1}]) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x5) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x3) 18:38:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\x13node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x4) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:38:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_b-ks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:38:05 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) r1 = accept(0xffffffffffffff9c, &(0x7f0000000000)=@xdp, &(0x7f0000000080)=0x80) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f00000000c0)={0xfffffffffffffff7, {{0x2, 0x4e20, @multicast1}}}, 0x88) close(r0) 18:38:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)=ANY=[@ANYBLOB="0100000000000000010000000000000000000000fffeff7f0000000000000000"]) [ 974.599557] EXT4-fs: 20 callbacks suppressed [ 974.599568] EXT4-fs (sda1): Unrecognized mount option "node_readahead_blks=0x0000000048000000" or missing value [ 974.747775] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_b-ks=0x0500000000000000" or missing value [ 974.809500] EXT4-fs (sda1): Unrecognized mount option "node_readahead_blks=0x0000000048000000" or missing value 18:38:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x3f000000}], 0x4000000000001b7, 0x0, 0x0) 18:38:06 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x4) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) close(r0) 18:38:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffff00000006}}], [], 0x8cffffff00000000}) 18:38:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000000020001000b00000000000000ebe58ce3f7b9ffc5ad7f000000000000380000"]) 18:38:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_b.ks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:38:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'Hnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:06 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x800, 0x2000) getpeername$netrom(r1, &(0x7f0000000040)={{0x3, @bcast}, [@rose, @remote, @bcast, @bcast, @default, @rose, @default]}, &(0x7f00000000c0)=0x48) 18:38:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x9, 0x20c001) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x40, @empty, 0x9}}, 0x6, 0x1654988b}, &(0x7f0000000180)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000001c0)={r3, 0x1, 0xa, "16d97c263d1bcef644c7"}, 0x12) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000000003d00010000000000000000ff7f00000000000000"]) [ 975.278782] EXT4-fs (sda1): Unrecognized mount option "Hnode_readahead_blks=0x0000000048000000" or missing value [ 975.355547] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_b.ks=0x0500000000000000" or missing value 18:38:06 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) recvmmsg(0xffffffffffffffff, &(0x7f0000001f80)=[{{&(0x7f0000000100)=@nfc, 0x80, &(0x7f0000001180)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, &(0x7f00000011c0)=""/168, 0xa8}, 0x3}, {{0x0, 0x0, &(0x7f0000001440), 0x2}, 0x8c4}, {{&(0x7f0000001480)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0xfff8, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/60, 0x1e2}, {&(0x7f0000001540)=""/103, 0x67}, {&(0x7f00000015c0)=""/53, 0x35}, {&(0x7f0000001600)=""/132, 0x84}, {&(0x7f00000016c0)=""/76, 0x4c}, {&(0x7f0000001740)=""/113, 0x71}], 0x6, &(0x7f0000001840)=""/26, 0x1a}}, {{0x0, 0x0, &(0x7f0000001900), 0x1, &(0x7f0000001940)=""/122, 0x7a}, 0x5}, {{&(0x7f00000019c0)=@rc, 0x80, &(0x7f00000000c0)=[{&(0x7f0000001a40)=""/161, 0xa1}, {&(0x7f0000001b00)=""/233, 0xe9}], 0x2, &(0x7f0000001c40)=""/194, 0xc2}, 0x5b9a}, {{&(0x7f0000001d40)=@can={0x1d, 0x0}, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001dc0)=""/250, 0xfa}], 0x1, &(0x7f0000000040)=""/119, 0x77}, 0xfffffffffffffff9}], 0x0, 0x20, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002100)={r1, @remote, @rand_addr=0x8001}, 0xc) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) getsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000001280)=""/170, &(0x7f0000001340)=0xaa) 18:38:06 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x403, 0x100000000098f908, 0x2}) close(r0) 18:38:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xfffffffffeffffff}}], [], 0x8cffffff00000000}) 18:38:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_bl%s', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) [ 975.709915] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_bl%s=0x0500000000000000" or missing value [ 975.869740] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_bl%s=0x0500000000000000" or missing value 18:38:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x3f00}], 0x4000000000001b7, 0x0, 0x0) 18:38:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\x11node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:07 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYBLOB="0100000000000000010000000000000000000000ffffff7f0000000000000000cf1396ce1b5fc83c01dfcba5c09e4d3aa8265cb5d5523cdd70412452f84b5add16327ce987b74bed44aca1"]) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x4e23, 0x7b79, @mcast1, 0x80000000}}, 0x0, 0xffffffff, 0x0, "0599f9acdb821d878fbe26e6d19eba9214a3f945194fb83d0aee35dbe91de473440904fd4487ce2ab687e9d72bfe14954bb7a7ca85185e8c86c03d0a4f495e494489e9e30a0019e0ce69027a8f8d4daa"}, 0xd8) 18:38:07 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f0000000180)=0xe8) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@deltclass={0x2c, 0x29, 0x2, 0x70bd27, 0x25dfdbfb, {0x0, r2, {0xf, 0xc}, {0xc, 0xd}, {0xfff3, 0x3}}, [@TCA_RATE={0x8, 0x5, {0x7ff, 0x13fc}}]}, 0x2c}}, 0x4) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) 18:38:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffff06000000}}], [], 0x8cffffff00000000}) 18:38:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_bl,s', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:38:07 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40001, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x5000011}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)={0x210, r2, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x84, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4bed40f5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}]}, @TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}]}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x59a1821c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffffffffffff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA={0xc4, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x72b}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6c}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xbf}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x210}, 0x1, 0x0, 0x0, 0x80}, 0x40) [ 976.211031] EXT4-fs (sda1): Unrecognized mount option "node_readahead_blks=0x0000000048000000" or missing value 18:38:07 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0xfffffffffffffffd) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000000000001003b00000000000000000000ffffff7f0000000000000000"]) [ 976.339512] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_bl" or missing value [ 976.391418] EXT4-fs (sda1): Unrecognized mount option "node_readahead_blks=0x0000000048000000" or missing value 18:38:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffe0}}], [], 0x8cffffff00000000}) 18:38:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'Snode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_bl\"s', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:38:07 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:38:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x4000}], 0x4000000000001b7, 0x0, 0x0) 18:38:08 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f0000000040)) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) r2 = request_key(&(0x7f0000000100)='blacklist\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='/dev/video#\x00', 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r2) 18:38:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x2000000000000000}}], [], 0x8cffffff00000000}) 18:38:08 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fanotify_init(0x41, 0x800) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:38:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'(node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blko', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:38:08 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905, 0x211a2f887a6ad95a}) close(r0) 18:38:08 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vcs\x00', 0x2400, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000540)='mmAz\t\xb4/\xba\xb9\x06u\xb3>gQ8\x80o/{\x98\x1a\x1e\x00\x00\x00\x00\xd7&M\xb6\xb2\x1d\xf4\xe2\xe4\xcda\xbe\\\xb4\f\t\xa6#\a\x8e\xd3\xbc8\x1b\xe5\x17\xc1l\x94\x0e\xfb\xf2=\xafv\xa5\x9f3\x1f\xfc\x96{\xed*cyAj)\xa0\x03\t\x93\xa9\xcaA3\xa5\xf6\xb7\x03_R\xe7\xba\b\rj\x9d\xde\xa1\xc82\xa2J=v\xc6B\x0f\x19\xff\xcdx\xe45\xccP\x12\xfc\xc2\xcb\xa7(\xb0P\xe328J>\xc2\x15h\xca\x8cav\xd2\xc8q\xf3q\x15\xbb-#\xbb*\x86\xf0\xb1\xe8\a]\xa21\b\x14\xc0\xf1\x94x\xa4\xdd:\x00\f\xf0Tr\xe7n\x83\x9d+\xf7}\xd96\x00\x00\x80', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000080)=0x9, 0x4) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:38:08 executing program 1: socket$bt_cmtp(0x1f, 0x3, 0x5) sched_setaffinity(0x0, 0x6, &(0x7f00000002c0)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x103f, 0x0) r0 = gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0}, 0x48) pipe(0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, 0x0, 0x0) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r1, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x42c) write$binfmt_elf64(r1, &(0x7f0000002040)=ANY=[@ANYBLOB="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"], 0xbe8) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0xb) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) shmget$private(0x0, 0x3000, 0x54000879, &(0x7f0000ffa000/0x3000)=nil) syz_open_procfs(0x0, 0x0) sched_setaffinity(r0, 0x8, &(0x7f00000000c0)) process_vm_readv(r0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/143, 0x8f}], 0x354, &(0x7f0000001540)=[{&(0x7f0000001400)=""/90, 0x5a}], 0x1, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={0x14, 0x8, "9cf39e19bc5cf712f5b02384"}, 0x0, 0x1000) tkill(r0, 0x1000000000014) syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) 18:38:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffff00000012}}], [], 0x8cffffff00000000}) 18:38:08 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r3, 0xc008561b, &(0x7f0000000080)={0x20, 0xfffffffffffffff8}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:38:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blkp', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:38:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x10000000000000}], 0x4000000000001b7, 0x0, 0x0) 18:38:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\x1cnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f0000000000)={0x3, 0x6, 0x136, 0x200}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:38:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xfffffffffffffffe}}], [], 0x8cffffff00000000}) 18:38:09 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) r1 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U-', 0x8000000005}, 0x28, 0x3) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r1) 18:38:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'+node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blk%', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:38:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:38:09 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0xffffffff}, 0x8) close(r0) accept4$tipc(r1, &(0x7f0000000080)=@id, &(0x7f00000000c0)=0x10, 0x800) 18:38:09 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x9, 0x80000) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x8, 0x402000) syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x6, 0x80202) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x800, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000200)={0x1, 0x0, [{0x2, 0x7, 0x5, 0x8, 0x8, 0x1, 0x7ff}]}) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:38:09 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xb, 0x2000) 18:38:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffff1c000000}}], [], 0x8cffffff00000000}) 18:38:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x800000000000000}], 0x4000000000001b7, 0x0, 0x0) 18:38:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) recvfrom$inet6(r2, &(0x7f0000000180)=""/254, 0xfe, 0x40000000, &(0x7f0000000080)={0xa, 0x4e21, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1005}, 0x1c) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1ffe) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:38:10 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) socket(0x5, 0x803, 0xffffffffffffff01) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='projid_map\x00') ioctl$SIOCX25SCALLUSERDATA(r1, 0x89e5, &(0x7f0000000040)={0x67, "6136983972ffdb5cbc2d83aee3eb5985147298627771648dba2f74416eef02b246a3f4922468d96bf08f38045b1f5b7c58283eee551ff1bb25282478c8d832f806f226958c6ff4da5e72633387bcec6827a226a03e60729978c4137846dbc8e270ea01eb411fcc2276cdb2853b9dc7f83a9de5c39a49d17324ca4739a5a435f0"}) 18:38:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'^node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blk,', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:38:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}, 0x22}], [], 0x8cffffff00000000}) 18:38:10 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000100)=0x0) write$P9_RGETLOCK(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="28cc7495000000370100015f4d0000000000009100000000", @ANYRES32=r2, @ANYBLOB='\n\x00/dev/null\x00'], 0x28) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000040)={0xfffffffffffffff8, 0x2}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) 18:38:10 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vcs\x00', 0x2400, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000540)='mmAz\t\xb4/\xba\xb9\x06u\xb3>gQ8\x80o/{\x98\x1a\x1e\x00\x00\x00\x00\xd7&M\xb6\xb2\x1d\xf4\xe2\xe4\xcda\xbe\\\xb4\f\t\xa6#\a\x8e\xd3\xbc8\x1b\xe5\x17\xc1l\x94\x0e\xfb\xf2=\xafv\xa5\x9f3\x1f\xfc\x96{\xed*cyAj)\xa0\x03\t\x93\xa9\xcaA3\xa5\xf6\xb7\x03_R\xe7\xba\b\rj\x9d\xde\xa1\xc82\xa2J=v\xc6B\x0f\x19\xff\xcdx\xe45\xccP\x12\xfc\xc2\xcb\xa7(\xb0P\xe328J>\xc2\x15h\xca\x8cav\xd2\xc8q\xf3q\x15\xbb-#\xbb*\x86\xf0\xb1\xe8\a]\xa21\b\x14\xc0\xf1\x94x\xa4\xdd:\x00\f\xf0Tr\xe7n\x83\x9d+\xf7}\xd96\x00\x00\x80', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000080)=0x9, 0x4) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:38:10 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x20000000000008, 0x800) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) r1 = request_key(&(0x7f0000000040)='rxrpc\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='@cgroup:)\\\x00', 0xffffffffffffffff) keyctl$describe(0x6, r1, &(0x7f0000000200)=""/195, 0xc3) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f00000003c0)={0x0, @reserved}) r2 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x94, 0x20000) shmget$private(0x0, 0x1000, 0x200, &(0x7f0000ffd000/0x1000)=nil) ioctl$SIOCX25GCALLUSERDATA(r2, 0x89e4, &(0x7f0000000300)={0x2, "1db66efc586fecc260389803da326e2e0afae7a966e62b6a1557255e6332205ff87aa30d1d4de0ba51ed6f1d4cf7bda091e714b9b2614b3a8c0af05b7c4225ba1ca24c0e58c208466a6387f51893983e82ed5e0d82eda514f89e7d3a919d20aa1fe89e51edf9481bd08a6321004608ecaad9ba5117e493b278c88d34211c61a9"}) 18:38:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blk#', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:38:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\x1dnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:10 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f0000000180)=0xe8) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@deltclass={0x2c, 0x29, 0x2, 0x70bd27, 0x25dfdbfb, {0x0, r2, {0xf, 0xc}, {0xc, 0xd}, {0xfff3, 0x3}}, [@TCA_RATE={0x8, 0x5, {0x7ff, 0x13fc}}]}, 0x2c}}, 0x4) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) [ 979.669793] EXT4-fs: 19 callbacks suppressed [ 979.669805] EXT4-fs (sda1): Unrecognized mount option "node_readahead_blks=0x0000000048000000" or missing value 18:38:11 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="4a00000063f2bab11c1bcbc7abc8ee72867cb18fdeba9ab151d2a22eb38964e4f26b93d9fd05fbcdd4ec4d5c31a96ef4091f969e7f102b22d2d211c7edabb40ad2dc589367d16d8ae1799c2b16b8"], &(0x7f0000000140)=0x52) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000200)={r1, @in={{0x2, 0x4e23, @broadcast}}, 0x4c, 0x7f, 0x3, 0x7fffffff, 0x8}, &(0x7f0000000180)=0x98) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f00000003c0)) r2 = syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x400001000009, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f0000000040)={0x8, 0x400, 0x2, 0xffff, 0x1000}) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/commit_pending_bools\x00', 0x1, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000002c0)={0x0, 0x0}) setpriority(0x1, r4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r2, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r2) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000300)={0x3cc}, 0x4) 18:38:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}, 0x2d}], [], 0x8cffffff00000000}) 18:38:11 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) read(r0, &(0x7f0000000000)=""/188, 0xbc) close(r0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)={0x67446698, 0x1, 0x1, 0x0, 0x2, "aec3fd178d828e6b9c1703101c7e6fcde8870a216cebdf907d5e308ee5a3e162dbc40c8b14f5171c21388c7e6dea70e1e966f453db38da9891fb06570655f8c03734cc97a5ca902c170c621c5747cb0449c2b0f043358c9f3f58d75085adaf4bad8c538bd2f7e6144947368608301382f8c7d2e950cb2e0fec77298e5dcfbaafb2de3b3e51bf2cd295c4ea608751141593ad88e5d49f5390ef3e9fbaf547755ad158148bd6006de4ec6acec44ddfffa117be4f7676f8903b24c3d618ed9bb1399a77402dc480c734931a7763a879e3ffdea4b18c0b121d94b3ec613625683d853ee544e425ed61026269a7e0"}, 0xfc) 18:38:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blku', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:38:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x10000000}], 0x4000000000001b7, 0x0, 0x0) 18:38:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={']node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) [ 980.054984] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_blks=0xffffffffffffffff-" or missing value [ 980.139393] EXT4-fs (sda1): Unrecognized mount option "]node_readahead_blks=0x0000000048000000" or missing value [ 980.199142] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_blku=0x0500000000000000" or missing value 18:38:11 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) read(r0, &(0x7f0000000000)=""/188, 0xbc) close(r0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)={0x67446698, 0x1, 0x1, 0x0, 0x2, "aec3fd178d828e6b9c1703101c7e6fcde8870a216cebdf907d5e308ee5a3e162dbc40c8b14f5171c21388c7e6dea70e1e966f453db38da9891fb06570655f8c03734cc97a5ca902c170c621c5747cb0449c2b0f043358c9f3f58d75085adaf4bad8c538bd2f7e6144947368608301382f8c7d2e950cb2e0fec77298e5dcfbaafb2de3b3e51bf2cd295c4ea608751141593ad88e5d49f5390ef3e9fbaf547755ad158148bd6006de4ec6acec44ddfffa117be4f7676f8903b24c3d618ed9bb1399a77402dc480c734931a7763a879e3ffdea4b18c0b121d94b3ec613625683d853ee544e425ed61026269a7e0"}, 0xfc) [ 980.260073] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_blks=0xffffffffffffffff-" or missing value 18:38:11 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x3c, 0x121040) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000080)={0x5, 0x5, 0xd548, 0x0, 0x2, 0x6c5c196, 0x3, 0x5, 0x6, 0x100000000, 0x7, 0x7, 0x0, 0xfffffffffffffe00, 0x1000, 0x8000, 0xfffffffffffffffa, 0x1, 0x1f}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) 18:38:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={')node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff04000000}) [ 980.400114] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_blku=0x0500000000000000" or missing value 18:38:11 executing program 1: r0 = socket(0x1b, 0x4, 0x100) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @empty}}, 0x1, 0x400, 0x81, 0x4800, 0x2}, &(0x7f0000000300)=0x98) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x400001000009, 0xfffffdfffffffffe) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) write$FUSE_INIT(r2, &(0x7f0000000080)={0x50, 0xfffffffffffffff5, 0x1, {0x7, 0x1c, 0x2d3e, 0x300802, 0x64, 0x7f, 0x1}}, 0x50) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000100)) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) r4 = getpgid(r3) fcntl$setown(r1, 0x8, r4) 18:38:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blk\"', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) [ 980.555077] EXT4-fs (sda1): Unrecognized mount option ")node_readahead_blks=0x0000000048000000" or missing value 18:38:11 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f0000000000)={0xc, {0x4, 0x8, 0x6, 0x4}}) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x80000000, 0x4, &(0x7f0000000300)=[{&(0x7f00000000c0)="89810a8199be6816eeabb65b2588", 0xe, 0x80000000}, {&(0x7f0000000100)="92a5a3778bbc3f469477046acf0fd9a5736f403da53a81f5a6abfbfa6788b2fb5e65270e", 0x24, 0x4}, {&(0x7f0000000200)="5a0f63f7b5ba023be4937a76ae3e3000865c9fc889a89054950f9252cd5f2cc21ead58c7f2dfd1102b34180c06464381b7aaaab4528222d7232bc37a2458dc25501e2b5d908c774d4185a294e73b9ca435a1c3296452f0dced92ebc4ef4f6e3335592b651ae629a633113333b1962b316ce2fb640789a5b8fdccf79074fd3a2eee7a385f6423481a75b8c0e53221fa24b26cbe17de638efa25212ee4fa54520fa32b64346944da629934049640dce19ba8baa7c642cd999678fb", 0xba, 0x1ff}, {&(0x7f00000004c0)="811fe2346cb58fdf1918639b04bb83cd51e7182b0c11cf478545e430491f89283ce8b8033625a17b60c3e6864fd61c7f0609e1432a8ec24b42568727981f6dc492cdf8d18250bdb6b29e9b7471fc850f", 0x50, 0x5}], 0x11011, &(0x7f0000000540)={[{@orlov='orlov'}, {@commit={'commit', 0x3d, 0x9}}, {@sb={'sb', 0x3d, 0x5}}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}, {@inode_readahead_blks={'inode_readahead_blks'}}, {@usrquota='usrquota'}], [{@uid_lt={'uid<', r1}}, {@fsuuid={'fsuuid', 0x3d, {[0x77, 0x33, 0x35, 0x7f, 0x34, 0x0, 0x63, 0x39], 0x2d, [0x7f, 0x34, 0x77, 0x75], 0x2d, [0x66, 0x34, 0x63, 0x39], 0x2d, [0x77, 0x64, 0x39, 0x73], 0x2d, [0x36, 0x77, 0x66, 0x66, 0x30, 0x77, 0x63]}}}]}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) ioctl$VIDIOC_ENUMAUDIO(r0, 0xc0345641, &(0x7f0000000140)={0x3f, "a3b298cc74463a2d088ade916cf45a121b50ff13bf44f43fc5012e48c40ef8ed", 0x1, 0xfbae682be94aa2c7}) 18:38:11 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) read(r0, &(0x7f0000000000)=""/188, 0xbc) close(r0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000300)={0x67446698, 0x1, 0x1, 0x0, 0x2, "aec3fd178d828e6b9c1703101c7e6fcde8870a216cebdf907d5e308ee5a3e162dbc40c8b14f5171c21388c7e6dea70e1e966f453db38da9891fb06570655f8c03734cc97a5ca902c170c621c5747cb0449c2b0f043358c9f3f58d75085adaf4bad8c538bd2f7e6144947368608301382f8c7d2e950cb2e0fec77298e5dcfbaafb2de3b3e51bf2cd295c4ea608751141593ad88e5d49f5390ef3e9fbaf547755ad158148bd6006de4ec6acec44ddfffa117be4f7676f8903b24c3d618ed9bb1399a77402dc480c734931a7763a879e3ffdea4b18c0b121d94b3ec613625683d853ee544e425ed61026269a7e0"}, 0xfc) [ 980.700586] EXT4-fs (sda1): Unrecognized mount option ")node_readahead_blks=0x0000000048000000" or missing value 18:38:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'6node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) [ 980.791706] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_blk"=0x0500000000000000" or missing value 18:38:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff2c000000}) 18:38:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x40000000}], 0x4000000000001b7, 0x0, 0x0) 18:38:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blkc', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:38:12 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) read(r0, &(0x7f0000000000)=""/188, 0xbc) close(r0) pipe(&(0x7f00000000c0)) [ 981.036281] EXT4-fs (sda1): Unrecognized mount option "6node_readahead_blks=0x0000000048000000" or missing value 18:38:12 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x80, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000240)='fou\x00') openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000380)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB='\\\x00\x00$', @ANYRES16=r2, @ANYBLOB="01002cbd7000fddbdf2502000000040005000800030033000000080003002b000000080001004e200000040005000800040002000000080003005e000000080004000100000008000400000000000800030033000000"], 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40, 0x0) ioctl(r0, 0x1, &(0x7f00000000c0)="c14898d346830574d7fd9159f8119017fc5e370a401f6038c36af252c11708fa78d7d8645964dba468b8450dafad608600fbb6d9d9d56404ca9a9cba02e7c4d081f2bab6392b24a305df60cdb2581a4290d3b425d5f40b76c6d578f6d76a566b63d93674262d5675da5fb38400283f77b88325e089c6a07e7526aa33010063c6865aa85e79d697fb9de03afb704613243901eefa9ccb63e2b5facc962978da88f45b9e83e080cca651a44dea5c2cd802c0e72b") getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) close(r0) 18:38:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff7a000000}) 18:38:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'=node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blk-', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:38:12 executing program 1: r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@generic, &(0x7f0000000080)=0x80) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f00000000c0)={0x2, 0xea, "152e1895f1a61faac32717f1fc62e2f4fc44bfba6aaeb4b7d0b33bbb4d0e44f479d2ad72bcafe56511ca3f6c1e56fba5762be0bb5ec27856f065566a2d4f0ca943abd56862a8d0db82d1d6312b09469aa8e6ae9708fd1aa4545b4539b1649c9a4626b4ab5177672744493ce3f60b46b9d5c4651f001727608b0d2b2426597c673c0fdf299c597abfa335a0644fe67bfacb26b1293059dc6b41b07436cf763e8eebe401b719e404cbd256e9f4ca2db5fc53610a4cbc379b88d3a6728306c5820e0b5d7314822a0727a67744efd67f152931030934af26e7ad79b9e9492d31e1f35a3a6ca76db81174d0e8"}) r1 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r1) 18:38:12 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) read(r0, &(0x7f0000000000)=""/188, 0xbc) close(r0) 18:38:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff0e0f0000}) 18:38:12 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000040)=0x100000000) 18:38:12 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) 18:38:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0xf0ffffff}], 0x4000000000001b7, 0x0, 0x0) 18:38:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\'node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:12 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x2, 0x400000000}) close(r0) 18:38:12 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) 18:38:13 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x40001, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0xffffffffffffffff, 0x3, 0x7, 0x0, 0x401}}) 18:38:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blk.', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:38:13 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) 18:38:13 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000007, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) 18:38:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff05000000}) 18:38:13 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x90000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000}) r3 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x10000) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f00000000c0)={r2, 0x80000, r3}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) 18:38:13 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) read(r0, &(0x7f0000000000)=""/188, 0xbc) close(r0) 18:38:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'Unode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x680e0000}], 0x4000000000001b7, 0x0, 0x0) 18:38:13 executing program 0: read(0xffffffffffffffff, &(0x7f0000000000)=""/188, 0xbc) close(0xffffffffffffffff) 18:38:13 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000040)={0x6, 0x8001, {0x0, 0x3, 0x51, {0x0, 0x8}, {0xfffffffffffffffd, 0x100000001}, @cond=[{0x2, 0x0, 0x6, 0x100000001, 0x8, 0x1}, {0x3, 0x7, 0x1, 0x2, 0x8e5, 0x8}]}, {0x56, 0x1, 0x1, {0xfff, 0x1}, {0x1, 0xfffffff800000000}, @cond=[{0x3, 0x6, 0xff2, 0x9, 0xde, 0x67}, {0x6a, 0x8, 0x47, 0xc6, 0x800, 0x1eb44e4c}]}}) fcntl$notify(r0, 0x402, 0x80000000) r1 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r1) 18:38:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blkX', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:38:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cfffffff6ffffff}) 18:38:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'>node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:13 executing program 0: r0 = syz_open_dev$video(0x0, 0x400001000009, 0x0) read(r0, &(0x7f0000000000)=""/188, 0xbc) close(r0) 18:38:13 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000000)={0x895, 0x0, [], {0x0, @reserved}}) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x5, 0x101002) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) close(r0) 18:38:14 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/188, 0xbc) close(r0) 18:38:14 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0xa8024) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) accept$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f0000000080)=0x10) fcntl$notify(r0, 0x402, 0xfffffffffffffffd) 18:38:14 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/188, 0xbc) close(r0) 18:38:14 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) 18:38:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blkl', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:38:14 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/188, 0xbc) close(r0) 18:38:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\x12node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000004}) 18:38:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x8}], 0x4000000000001b7, 0x0, 0x0) 18:38:14 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$SIOCX25SCALLUSERDATA(r1, 0x89e5, &(0x7f0000000040)={0x1a, "66fdde3a00f9fd45d62a387a822e69d234b8a97413e3e2304f744bf43d4c5b55572f7d9f68467c2b44f5ccdc6fb9041570a304ce6e98f254b5525f34df17c66030e3cee8fd1b5b4dc8c1e4093631ea2592ff820571f4ee430f2e501b7d192e4211f38b6bcf283e69dae9d76efe725caab3b0b1e372e39f426c17ed52940293b8"}) 18:38:14 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) read(0xffffffffffffffff, &(0x7f0000000000)=""/188, 0xbc) close(r0) 18:38:14 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) recvfrom$unix(r0, &(0x7f00000000c0)=""/84, 0x54, 0x0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x10002, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000080)=0x122, 0x4) write$FUSE_POLL(r1, &(0x7f0000000200)={0x18, 0xfffffffffffffff5, 0x6, {0x80}}, 0x18) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0xac, &(0x7f0000000300)=[@in={0x2, 0x0, @empty}, @in6={0xa, 0x4e24, 0x80000000, @mcast1, 0x2}, @in6={0xa, 0x4e20, 0xfff, @mcast2, 0xdc7}, @in6={0xa, 0x4e22, 0x3, @local, 0x2}, @in6={0xa, 0x4e20, 0xc2, @dev={0xfe, 0x80, [], 0x1c}}, @in6={0xa, 0x4e24, 0x1, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x2}, @in={0x2, 0x4e23, @multicast1}]}, &(0x7f00000003c0)=0x10) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000400)={r2, @in6={{0xa, 0x4e23, 0x200, @mcast2, 0x4}}}, 0x84) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x10000, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000500)) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x5, 0x1) 18:38:14 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) read(0xffffffffffffffff, &(0x7f0000000000)=""/188, 0xbc) close(r0) 18:38:14 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) read(0xffffffffffffffff, &(0x7f0000000000)=""/188, 0xbc) close(r0) 18:38:15 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000000)={0xe, @output={0x1000, 0x1, {0x5, 0x10001}, 0x0, 0x7}}) fsync(r0) close(r0) 18:38:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff6b6b6b00}) 18:38:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blki', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:38:15 executing program 1: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)={0x0, 0x0}) sched_setaffinity(r0, 0x8, &(0x7f0000000080)=0xe6) r1 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r1) r2 = gettid() sched_setattr(r2, &(0x7f0000000000)={0x30, 0x0, 0x1, 0xc6, 0x6, 0xffffffff, 0x0, 0x3}, 0x0) 18:38:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\x16node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:15 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) read(r0, 0x0, 0x0) close(r0) 18:38:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x680e000000000000}], 0x4000000000001b7, 0x0, 0x0) 18:38:15 executing program 1: r0 = dup(0xffffffffffffff9c) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000000)) r1 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r1) 18:38:15 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) read(r0, 0x0, 0x0) close(r0) 18:38:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blkd', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:38:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000e0f}) 18:38:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\bnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:15 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x101000, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000000)={0x4, 0x4, 0xfff, 0x1, 0x1ff}) r1 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f00000001c0)={0x5, 0x100000000098f905, 0x1}) close(r1) 18:38:15 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) read(r0, 0x0, 0x0) close(r0) 18:38:15 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) read(r0, &(0x7f0000000000)=""/188, 0xbc) close(0xffffffffffffffff) [ 984.793629] EXT4-fs: 22 callbacks suppressed [ 984.793639] EXT4-fs (sda1): Unrecognized mount option "node_readahead_blks=0x0000000048000000" or missing value 18:38:15 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) 18:38:16 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x101000, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000000)={0x4, 0x4, 0xfff, 0x1, 0x1ff}) r1 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f00000001c0)={0x5, 0x100000000098f905, 0x1}) close(r1) [ 984.903851] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_blkd=0x0500000000000000" or missing value 18:38:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00003f00}) 18:38:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'2node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x100000000000000}], 0x4000000000001b7, 0x0, 0x0) 18:38:16 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x101000, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000000)={0x4, 0x4, 0xfff, 0x1, 0x1ff}) r1 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f00000001c0)={0x5, 0x100000000098f905, 0x1}) close(r1) 18:38:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blk+', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:38:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000700}) 18:38:16 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x4000, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r1, 0x0, 0x1, 0x0, &(0x7f0000000040)=[0x0, 0x0], 0x2}, 0x20) 18:38:16 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x101000, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000000)={0x4, 0x4, 0xfff, 0x1, 0x1ff}) r1 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f00000001c0)={0x5, 0x100000000098f905, 0x1}) close(r1) 18:38:16 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x8001004, 0x100000000098f905}) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x3000000) close(r0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0xf8, 0x8, 0x1, 0x8, 0x20, 0x10000}) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x80, 0x400000) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000140)=0xea6) [ 985.640107] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_blk+=0x0500000000000000" or missing value [ 985.719464] EXT4-fs (sda1): Unrecognized mount option "2node_readahead_blks=0x0000000048000000" or missing value 18:38:16 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x101000, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000000)={0x4, 0x4, 0xfff, 0x1, 0x1ff}) r1 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) close(r1) 18:38:16 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000180)={0x4, 0x40eb, 0x3, 0x3}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000280)={0xfffffffffffffffd}, 0x4) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r2, 0x0, 0x70bd28, 0x25dfdbfe, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x9}}, ["", "", "", ""]}, 0x24}}, 0xc1) close(0xffffffffffffffff) [ 985.840523] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_blk+=0x0500000000000000" or missing value 18:38:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'$node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:17 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x101000, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000000)={0x4, 0x4, 0xfff, 0x1, 0x1ff}) r1 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) close(r1) 18:38:17 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xeea4, 0x80000) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000040)=0x3, 0x4) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000080)={{0x0, 0x3, 0x0, 0x1, 0x1800000000}, 0x4, 0xd6, 'id0\x00', 'timer0\x00', 0x0, 0x5a0, 0x8, 0x4}) [ 986.099933] EXT4-fs (sda1): Unrecognized mount option "$node_readahead_blks=0x0000000048000000" or missing value [ 986.279797] EXT4-fs (sda1): Unrecognized mount option "$node_readahead_blks=0x0000000048000000" or missing value 18:38:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0xe68}], 0x4000000000001b7, 0x0, 0x0) 18:38:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blkx', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:38:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000022}) 18:38:17 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x101000, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000000)={0x4, 0x4, 0xfff, 0x1, 0x1ff}) r1 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) close(r1) 18:38:17 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x400001000009, 0x240200) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) 18:38:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\x1bnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:17 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f0000000000)={0x3, "f10d842ca4cab424031c1dd975caef469b54f694bd1e77f8a5e6373f6ce7a9c2", 0x1830, 0x7, 0x8, 0x4, 0x3}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000080)={0x3, 0x100000000098f905}) close(r0) 18:38:17 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x101000, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000000)={0x4, 0x4, 0xfff, 0x1, 0x1ff}) ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f00000001c0)={0x5, 0x100000000098f905, 0x1}) close(0xffffffffffffffff) [ 986.538504] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_blkx=0x0500000000000000" or missing value 18:38:17 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x7, 0x80000000) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x22040, 0x0) sendto$rose(r1, &(0x7f0000000040)="212bc045e45f166026929cda5863e07d473fdcfef17bdedb5b4f10d4907acf366cc9cdcf169d47e86620997a31e7f9c77cddf77078e8f99dfefa540d1753d26190b8d7ba90e3006125496eaf38408cb4c92004fa4ce883a6ee6076f6bceef8139b7bb04b8842e5c6bd165e7e3166feb46f5781992e95dfcafcb5fafdffe389d8f3071888af2521bb63270871ec7ec19ea72260f8f9c2557ea2e29f483f5eff6a4317a1bc770adb38e561bffed0fe8f6be147c4f17947bc36c19900c1e1d93a093a86c1b73d0f4d61f94fb11ac06f177e21d391087aea48201ba8318fabbe51b0fab758ef69a6b1d2121d2bc3fdf294be876859e1f01e0b30", 0xf8, 0x41, &(0x7f0000000140)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x1, [@null, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x40) close(r0) fstatfs(r1, &(0x7f0000000200)=""/152) 18:38:17 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x101000, 0x0) r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x5, 0x100000000098f905, 0x1}) close(r0) [ 986.669991] EXT4-fs (sda1): Unrecognized mount option "node_readahead_blks=0x0000000048000000" or missing value 18:38:17 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000040)={0x3, 0x100000000298f905, 0xfffffffffffffffc}) close(r0) 18:38:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blk*', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) [ 986.912738] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_blk*=0x0500000000000000" or missing value 18:38:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x8dffffff00000000}], 0x4000000000001b7, 0x0, 0x0) 18:38:18 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x5, 0x100000000098f905, 0x1}) close(r0) 18:38:18 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x40000100000a, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) 18:38:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'.node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000007}) 18:38:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blk0', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:38:18 executing program 0: r0 = syz_open_dev$video(0x0, 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x5, 0x100000000098f905, 0x1}) close(r0) 18:38:18 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x1, 0x0) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) r1 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x40000) write$P9_RUNLINKAT(r0, &(0x7f00000000c0)={0x7, 0x4d, 0x4001}, 0x7) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r1) 18:38:18 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x5, 0x100000000098f905, 0x1}) close(r0) 18:38:18 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x5, 0x100000000098f905, 0x1}) close(r0) 18:38:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'fnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x25, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:38:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x3f00000000000000}], 0x4000000000001b7, 0x0, 0x0) 18:38:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff68000000}) 18:38:19 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) dup(r0) close(r0) 18:38:19 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x5, 0x100000000098f905, 0x1}) close(r0) 18:38:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'5node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x2c, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:38:19 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f00000001c0)={0x5, 0x100000000098f905, 0x1}) close(r0) 18:38:19 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x110000002098f905}) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) write$FUSE_POLL(r1, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x4}}, 0x18) 18:38:19 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f00000001c0)={0x5, 0x100000000098f905, 0x1}) close(r0) 18:38:19 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r0, 0xc0c85666, &(0x7f00000000c0)={{0x2, @name="8792d7a3e2d4ae8809073f004d67ebd2040b1c0cae1a7b492103b6db88f77d6e"}, "5f3d0ec27113b5b656ccf5849a995f0225711f478e05591fa44f505c800008a2", 0x3}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000000)={0x0, @frame_sync}) 18:38:19 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f00000001c0)={0x5, 0x100000000098f905, 0x1}) close(r0) 18:38:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff6c000000}) 18:38:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0xf0ffffff00000000}], 0x4000000000001b7, 0x0, 0x0) 18:38:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'enode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:20 executing program 1: lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00', &(0x7f0000000080)='/dev/video#\x00', 0xc, 0x2) r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) 18:38:20 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, 0x0) close(r0) 18:38:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x2d, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:38:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff07000000}) 18:38:20 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, 0x0) close(r0) 18:38:20 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v2={0x2000000, [{0xae, 0x80000000}, {0xe9, 0x4db}]}, 0x14, 0x1) 18:38:20 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, 0x0) close(r0) 18:38:20 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000000)={0x3, 0x100000000098f905, 0x2}) close(r0) 18:38:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x22, 0x500000000000000}}], [], 0x8cffffff00000000}) 18:38:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffffffffff8c}) 18:38:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x8dffffff}], 0x4000000000001b7, 0x0, 0x0) 18:38:21 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x0, 0x100000000098f905, 0x1}) close(r0) 18:38:21 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) r1 = getpgid(0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000000)=0x2) close(r0) 18:38:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\x15node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:21 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000040000000}}], [], 0x8cffffff00000000}) 18:38:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff03000000}) 18:38:21 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) 18:38:21 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x0, 0x100000000098f905, 0x1}) close(r0) 18:38:21 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x10000, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) 18:38:21 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x0, 0x100000000098f905, 0x1}) close(r0) [ 990.450923] EXT4-fs: 13 callbacks suppressed [ 990.450975] EXT4-fs (sda1): Unrecognized mount option "node_readahead_blks=0x0000000048000000" or missing value 18:38:21 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) r1 = accept(0xffffffffffffffff, &(0x7f0000000240)=@alg, &(0x7f0000000140)=0x80) sendto$inet6(r1, &(0x7f0000000180)="a5be9aa1d4686d10726021f16b731b6ebbb35ddc997e80c92511aa0b3f2042f69e71453930172998", 0x28, 0xc000, &(0x7f0000000200)={0xa, 0x4e21, 0x7, @local, 0x4}, 0x1c) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x8, 0x10100) ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0x80045500, &(0x7f0000000040)) 18:38:21 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x5, 0x0, 0x1}) close(r0) [ 990.660948] EXT4-fs (sda1): Unrecognized mount option "node_readahead_blks=0x0000000048000000" or missing value 18:38:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x8000000}], 0x4000000000001b7, 0x0, 0x0) 18:38:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x5000000006b6b6b}}], [], 0x8cffffff00000000}) 18:38:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00400000}) 18:38:22 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x5}) close(r0) 18:38:22 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x400001000009, 0xfffffffffffffffc) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x100, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x10580, 0x83) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x12}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r3, 0xb10, 0x70bd27, 0x25dfdbfc, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44041}, 0x4000000) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) 18:38:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'%node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:22 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x5}) close(0xffffffffffffffff) 18:38:22 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) r1 = socket$inet6(0xa, 0x800, 0x5) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000000)=ANY=[@ANYBLOB="726177000000000000000000000040000000000000000000000000050000000002000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x48) close(r0) [ 991.370780] EXT4-fs (sda1): Unrecognized mount option "%node_readahead_blks=0x0000000048000000" or missing value 18:38:22 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x22, &(0x7f000001bc78)=@raw={'\x05\x00\x00\x00\x02\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x18\x00\x00\x00\x03\x03\x00', 0x9, 0x3, 0xffffffffffffff22, 0x0, 0xffffffff, 0xffffffff, 0x120, 0xffffffff, 0x258, 0xffffffff, 0xffffffff, 0x258, 0xffffffff, 0x3, &(0x7f000002cfd0), {[{{@uncond, 0x0, 0xa8, 0x52}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x4, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x2e) 18:38:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff40000000}) 18:38:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000003000000}}], [], 0x8cffffff00000000}) [ 991.535766] EXT4-fs (sda1): Unrecognized mount option "%node_readahead_blks=0x0000000048000000" or missing value 18:38:22 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x22, &(0x7f000001bc78)=@raw={'\x05\x00\x00\x00\x02\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x18\x00\x00\x00\x03\x03\x00', 0x9, 0x3, 0xffffffffffffff22, 0x0, 0xffffffff, 0xffffffff, 0x120, 0xffffffff, 0x258, 0xffffffff, 0xffffffff, 0x258, 0xffffffff, 0x3, &(0x7f000002cfd0), {[{{@uncond, 0x0, 0xa8, 0x52}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x4, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x2e) 18:38:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x1000000000000000}], 0x4000000000001b7, 0x0, 0x0) 18:38:23 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000040)=0x3ff) r2 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x3f, 0x100) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) setgid(r4) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000240)={0x0, 0x7, 0x80, [], &(0x7f0000000200)={0xb90b7f, 0x5, [], @ptr=0xff}}) lookup_dcookie(0xada10000000, &(0x7f00000000c0)=""/65, 0x41) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000180)={0x80, 0x4, &(0x7f0000000140)="d93436551f95b0dc2c2b29974e8a78afdbdd3e14371810118965e6b373c8ef98d1a3708e49999ff094abfab4", {0x100000000, 0x80000001, 0x33337d5f, 0x7, 0x2, 0x7fff, 0x8, 0x81}}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'syzkaller1\x00', r3}) connect$packet(r2, &(0x7f0000000400)={0x11, 0x1d, r3, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$SIOCX25SCAUSEDIAG(r2, 0x89ec, &(0x7f0000000440)={0x1, 0x3}) 18:38:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'*node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000002c0)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) 18:38:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff0000007a}) 18:38:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000007400}}], [], 0x8cffffff00000000}) [ 992.245473] EXT4-fs (sda1): Unrecognized mount option "*node_readahead_blks=0x0000000048000000" or missing value 18:38:23 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) 18:38:23 executing program 0: syz_execute_func(&(0x7f0000000140)="3666440f50f564ff0941c3c401f82ebd92823dcfc4c27d794e0066420fe2e3660fa041d288766d0000d3196f") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000a9cff8)) socket$packet(0x11, 0x3, 0x300) write$tun(r1, 0x0, 0x0) 18:38:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000500}}], [], 0x8cffffff00000000}) 18:38:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'Anode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:23 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x800100b, 0x100000000098f905}) fcntl$setsig(r0, 0xa, 0x18) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f00000000c0)={0x7, 0x4, 0x4, 0x1000000, {}, {0x5, 0xa, 0x4, 0x3, 0xa4, 0x2a, "c454718b"}, 0x6, 0x3, @offset, 0x4}) ioctl$VIDIOC_S_PRIORITY(r0, 0x40045644, 0x23) close(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x6, &(0x7f0000000140)=[{0xfffffffffffffff8, 0x2, 0x2, 0x6}, {0x9, 0x4, 0x81, 0x8}, {0x8, 0xfe3a, 0x400, 0x2}, {0xfffffffffffffff9, 0x0, 0x0, 0x1}, {0x5, 0xdd, 0x7}, {0x100000000, 0xff, 0x7, 0xffffffffffff0001}]}, 0x10) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000240)={'eql\x00', {0x2, 0x4e20, @remote}}) splice(r0, &(0x7f0000000000), r0, &(0x7f0000000040), 0x3, 0x6) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f00000002c0)={0x0, 0x800, 0x8, [], &(0x7f0000000280)=0x9}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000200)) 18:38:23 executing program 0: syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x8000, 0x1, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200008000f8", 0x16}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r1, 0x82307202, &(0x7f0000000000)) [ 992.681867] EXT4-fs (sda1): Unrecognized mount option "Anode_readahead_blks=0x0000000048000000" or missing value 18:38:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x100000}], 0x4000000000001b7, 0x0, 0x0) 18:38:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff0000002d}) 18:38:24 executing program 0: r0 = dup(0xffffffffffffffff) getpid() syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_XSAVE(0xffffffffffffffff, 0x5000aea5, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f00000002c0), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x2, 0xb}}, 0x20) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, 0x0, 0x0) sendto(r1, &(0x7f00000001c0)="960244f05d397a77e1de9a0f784135de10ab36d43c927e7c193b9259b74e6b797373b2145d8583a98714ce138215a0e669ccadae0ebfff7417dfac2abef14d8a32637f7db5a647a00a5a6fe773be6c6e4db3cc03dca471b1b7d1cf0959d2d45d9ccbf9bd3b0eacaba8c9f2f1559b4c0def6fa0d60561a2de26512ad9cdda5cc3d1816fc64d34b8454fca461c50b07287484d8081972dd659693ae80c4c62a0c66931f3627161a5c69dc9f1dc4287c28f9efb6f75baa849114aea4ae049a7d560", 0xc0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f00000002c0)="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", 0x798, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000680)={0xb, 0x10, 0xfa00, {&(0x7f0000000540), 0xffffffffffffffff, 0x352}}, 0x18) 18:38:24 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8, 0x200800) setsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000040)=0x2, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1000, 0x1018, 0x2, {"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"}}, {0x0, "d052603d00ca45b41e8aaf617783f08a19986e0e6eca37ab9e8c744e1e9201c4f374439ea694ae436275a2eff639242b"}}, &(0x7f0000000080)=""/141, 0x104a, 0x8d, 0x1}, 0x20) close(r0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f00000013c0)={0xfffffff, 0x9, 0x2, [], &(0x7f0000001380)={0x990a2c, 0x4507, [], @string=&(0x7f0000000180)=0x3ab}}) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f0000000200)={0x83, ""/131}) 18:38:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000004000}}], [], 0x8cffffff00000000}) 18:38:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\x04node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:24 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1008000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r1, 0x200, 0x70bd2b, 0x25dfdbfb, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x6, @media='eth\x00'}}}, [""]}, 0x68}, 0x1, 0x0, 0x0, 0x40448c0}, 0x80) r2 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r2, 0x4020565a, &(0x7f00000001c0)={0x3, 0x7f, 0x80000000000}) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000180)=0x1) close(r2) [ 993.313745] EXT4-fs (sda1): Unrecognized mount option "node_readahead_blks=0x0000000048000000" or missing value 18:38:24 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x400c80) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') timerfd_gettime(r1, &(0x7f0000000080)) sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x343e30e31d7303fa}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0xac, r2, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x98, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8001}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'rose0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x1, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x12}}, 0x1}}, {0x14, 0x2, @in={0x2, 0x4e24, @local}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x80}, 0x800) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, 0xfffffffffffffffe, &(0x7f0000000100)) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r1) 18:38:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00002d00}) 18:38:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x50000001f000000}}], [], 0x8cffffff00000000}) 18:38:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\x1enode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:24 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x48000, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000040)={0x4, 0x2, 'client1\x00', 0x0, "398b6b2a2b92c396", "3160d6ca119883e38edce66c12e278b7239a249a1e117fddb234de57dacb1698", 0x9, 0x9}) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000180)) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000000)) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000140)) [ 993.769705] EXT4-fs (sda1): Unrecognized mount option "node_readahead_blks=0x0000000048000000" or missing value [ 993.959167] EXT4-fs (sda1): Unrecognized mount option "node_readahead_blks=0x0000000048000000" or missing value 18:38:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0xfffffff0}], 0x4000000000001b7, 0x0, 0x0) 18:38:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_SO_BINDTODEVICE(r1, 0x101, 0x19, &(0x7f0000000000)=@netrom={'nr', 0x0}, 0x10) 18:38:25 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) dup2(r1, r1) 18:38:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cfffffffffffff6}) 18:38:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x50000000000002c}}], [], 0x8cffffff00000000}) 18:38:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'`node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:25 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f903}) close(r0) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000000)={0x0, "49dbced2484e2e2e4a0b446d1e2dbca0bfd4f022b5ace3b77b3ba8f3e8c8c5ee", 0x3, 0x1}) 18:38:25 executing program 0: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x4000000000080003, 0x0) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0xfff, 0x4) r1 = socket$inet(0x2, 0x6000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @remote}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x20000802, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='tunl0\x00', 0x10) sendto$inet(r1, &(0x7f00000003c0), 0x0, 0x1f4, 0x0, 0x0) 18:38:25 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x80000000005000, 0x0) 18:38:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff22000000}) [ 994.478478] EXT4-fs (sda1): Unrecognized mount option "`node_readahead_blks=0x0000000048000000" or missing value 18:38:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x50000000e0f0000}}], [], 0x8cffffff00000000}) 18:38:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x100) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) 18:38:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0xffffff8d}], 0x4000000000001b7, 0x0, 0x0) 18:38:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'Enode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff01000000}) 18:38:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x100) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) 18:38:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x400000000000000}}], [], 0x8cffffff00000000}) 18:38:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000003080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5413, &(0x7f0000000300)) 18:38:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'-node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:26 executing program 1: r0 = socket$inet(0x2, 0x6000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000080)={0x2, 0x404e23, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x1f4, 0x0, 0x0) 18:38:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 995.647225] EXT4-fs: 3 callbacks suppressed [ 995.647236] EXT4-fs (sda1): Unrecognized mount option "-node_readahead_blks=0x0000000048000000" or missing value [ 995.769710] EXT4-fs (sda1): Unrecognized mount option "-node_readahead_blks=0x0000000048000000" or missing value 18:38:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00006c00}) 18:38:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000022000000}}], [], 0x8cffffff00000000}) 18:38:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0xffffffff00000000}], 0x4000000000001b7, 0x0, 0x0) 18:38:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x180, 0x0) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000006c0)=""/200) getpgrp(0x0) fstat(r1, &(0x7f0000000a40)) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) gettid() mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pread64(r3, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x7fffffff) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000580), &(0x7f0000000680)=0xc) recvfrom(0xffffffffffffffff, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) clock_gettime(0xfffffffffffffff4, 0x0) 18:38:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\x1anode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 996.170154] EXT4-fs (sda1): Unrecognized mount option "node_readahead_blks=0x0000000048000000" or missing value 18:38:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000003}) 18:38:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000020000000}}], [], 0x8cffffff00000000}) 18:38:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'Rnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 996.724535] EXT4-fs (sda1): Unrecognized mount option "Rnode_readahead_blks=0x0000000048000000" or missing value 18:38:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x4000000000000000}], 0x4000000000001b7, 0x0, 0x0) 18:38:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cfffffffffffdfd}) 18:38:28 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_REINJECT_CONTROL(0xffffffffffffffff, 0xae71, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x180, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) getpgrp(0x0) fstat(r0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r4, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) write$binfmt_misc(r2, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000680)) recvfrom(r3, 0x0, 0x0, 0x10100, 0x0, 0x0) clock_gettime(0xfffffffffffffff4, 0x0) 18:38:28 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'Inode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000003f00}}], [], 0x8cffffff00000000}) 18:38:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000048}) [ 997.399305] EXT4-fs (sda1): Unrecognized mount option "Inode_readahead_blks=0x0000000048000000" or missing value 18:38:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000006c00}}], [], 0x8cffffff00000000}) [ 997.542860] EXT4-fs (sda1): Unrecognized mount option "Inode_readahead_blks=0x0000000048000000" or missing value 18:38:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'Gnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d239084aa6dad12c2945a2c4e5eba574e1a14a06e0b2e63c70d3c9c74f3528340f5441befa61cfac765fa54709317ceb15c570b76ddc6e57261b932d978efba70eb010420220a68ebd72757374341c21d74063d9b2721350ed9ab7b24dc237ee4d801fc62b66cd5de4d1a13dffea4a7ba1431e312ff5afe94aa3032f7c5ab1815e9ebb6ba9", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:38:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cfffffffffffdfc}) [ 997.966650] EXT4-fs (sda1): Unrecognized mount option "Gnode_readahead_blks=0x0000000048000000" or missing value [ 998.100988] EXT4-fs (sda1): Unrecognized mount option "Gnode_readahead_blks=0x0000000048000000" or missing value 18:38:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000057000)={0xfffffffffffffffe}, 0x0, 0x8) timer_create(0x3, &(0x7f0000044000)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000d43000)) 18:38:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x800000000000000}}], [], 0x8cffffff00000000}) 18:38:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'Mnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000005}) 18:38:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) sendmmsg(r0, &(0x7f00000002c0), 0x40003bf, 0x20048001) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) bind$unix(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x10, r3, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f00000000c0)) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000001c0)={0x0, @broadcast, @loopback}, &(0x7f0000000280)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000440)={@empty, 0x0, r4}) write$P9_RREMOVE(r1, &(0x7f0000000100)={0x7, 0x7b, 0x2}, 0xfffffffffffffed2) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r5 = getpid() perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x4d2d, 0x6, 0x1c13dda9, 0x0, 0x20, 0x0, 0x4, 0xff, 0x0, 0x3, 0x0, 0x2, 0x341, 0x3, 0x5, 0x8000000000000, 0x9, 0x2, 0x0, 0x8001, 0x4, 0x2, 0x0, 0x7, 0x0, 0x9, 0x5, 0x7, 0xee, 0x4, 0x7ff, 0xff, 0x4, 0x0, 0xfffffffffffffff7, 0x0, 0xffffffffffff29bb, 0x1, @perf_config_ext={0x0, 0x9}, 0x40, 0x5, 0x7f, 0x4, 0x5c7, 0x0, 0x3f}, r5, 0xe, 0xffffffffffffffff, 0x1) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x1) syz_open_procfs(0x0, &(0x7f0000000640)='fd/4\x00') 18:38:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 998.516520] EXT4-fs (sda1): Unrecognized mount option "Mnode_readahead_blks=0x0000000048000000" or missing value 18:38:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)='\n\au', 0x3) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 998.614482] audit: type=1804 audit(1546195109.652:90): pid=6810 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir966133220/syzkaller.o38nV3/1181/bus" dev="sda1" ino=17745 res=1 18:38:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x50000000000006c}}], [], 0x8cffffff00000000}) 18:38:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\vnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:38:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b0", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff8cffffff}) [ 998.949878] audit: type=1804 audit(1546195109.992:91): pid=6818 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir966133220/syzkaller.o38nV3/1181/bus" dev="sda1" ino=17745 res=1 [ 998.981966] EXT4-fs (sda1): Unrecognized mount option " node_readahead_blks=0x0000000048000000" or missing value 18:38:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d239084aa6dad12c2945a2c4e5eba574e1a14a06e0b2e63c70d3c9c74f3528340f5441befa61cfac765fa54709317ceb15c570b76ddc6e57261b932d978efba70eb010420220a68ebd72757374341c21d74063d9b2721350ed9ab7b24dc237ee4d801fc62b66cd5de4d1a13dffea4a7ba1431e312ff5afe94aa3032f7c5ab1815e9ebb6ba9", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 999.047314] audit: type=1804 audit(1546195110.062:92): pid=6818 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir966133220/syzkaller.o38nV3/1181/bus" dev="sda1" ino=17745 res=1 18:38:30 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_targets\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) [ 999.083925] audit: type=1804 audit(1546195110.062:93): pid=6818 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir966133220/syzkaller.o38nV3/1181/bus" dev="sda1" ino=17745 res=1 18:38:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'Wnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x50000000000007a}}], [], 0x8cffffff00000000}) 18:38:30 executing program 1: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000280)="600084e002000a00900cda40ff1ad5c98f1347", 0x13, 0x400}], 0x0, 0x0) 18:38:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d239084aa6dad12c2945a2c4e5eba574e1a14a06e0b2e63c70d3c9c74f3528340f5441befa61cfac765fa54709317ceb15c570b76ddc6e57261b932d978efba70eb010420220a68ebd72757374341c21d74063d9b2721350ed9ab7b24dc237ee4d801fc62b66cd5de4d1a13dffea4a7ba1431e312ff5afe94aa3032f7c5ab1815e9ebb6ba9", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff006b6b6b}) 18:38:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:38:30 executing program 1: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000280)="600084e002000a00900cda40ff1ad5c98f1347", 0x13, 0x400}], 0x0, 0x0) 18:38:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'1node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x5000000fffffdfd}}], [], 0x8cffffff00000000}) 18:38:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff20000000}) 18:38:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) gettid() timer_create(0x0, 0x0, 0x0) 18:38:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'Vnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x50000000000004c}}], [], 0x8cffffff00000000}) 18:38:31 executing program 1: [ 1000.680331] EXT4-fs: 6 callbacks suppressed [ 1000.680342] EXT4-fs (sda1): Unrecognized mount option "Vnode_readahead_blks=0x0000000048000000" or missing value 18:38:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:38:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80), 0x0, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:31 executing program 1: 18:38:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00002c00}) 18:38:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\x18node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:31 executing program 1: 18:38:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000074}}], [], 0x8cffffff00000000}) 18:38:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80), 0x0, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:32 executing program 1: 18:38:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80), 0x0, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:32 executing program 1: [ 1001.105837] EXT4-fs (sda1): Unrecognized mount option "node_readahead_blks=0x0000000048000000" or missing value 18:38:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00007400}) 18:38:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:38:32 executing program 1: 18:38:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'hnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000006000000}}], [], 0x8cffffff00000000}) 18:38:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:32 executing program 1: 18:38:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:33 executing program 1: [ 1001.970034] EXT4-fs (sda1): Unrecognized mount option "hnode_readahead_blks=0x0000000048000000" or missing value 18:38:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000000000000}}], [], 0x8cffffff00000000}) 18:38:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:33 executing program 1: 18:38:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00004000}) [ 1002.172882] EXT4-fs (sda1): Unrecognized mount option "hnode_readahead_blks=0x0000000048000000" or missing value 18:38:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:38:33 executing program 1: 18:38:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'Dnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000048}}], [], 0x8cffffff00000000}) 18:38:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000f0e}) 18:38:33 executing program 1: 18:38:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1002.821465] EXT4-fs (sda1): Unrecognized mount option "Dnode_readahead_blks=0x0000000048000000" or missing value 18:38:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{0x0}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:34 executing program 1: 18:38:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{0x0}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'#node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) [ 1003.327309] EXT4-fs (sda1): Unrecognized mount option "#node_readahead_blks=0x0000000048000000" or missing value [ 1003.459745] EXT4-fs (sda1): Unrecognized mount option "#node_readahead_blks=0x0000000048000000" or missing value 18:38:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:38:34 executing program 1: 18:38:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{0x0}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000002000000}}], [], 0x8cffffff00000000}) 18:38:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff10000000}) 18:38:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'Znode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:34 executing program 1: 18:38:34 executing program 1: [ 1003.911689] EXT4-fs (sda1): Unrecognized mount option "Znode_readahead_blks=0x0000000048000000" or missing value 18:38:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff3f000000}) 18:38:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000007000000}}], [], 0x8cffffff00000000}) [ 1004.031752] EXT4-fs (sda1): Unrecognized mount option "Znode_readahead_blks=0x0000000048000000" or missing value 18:38:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:38:35 executing program 1: 18:38:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'Bnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cfffffffcfdffff}) 18:38:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x300000000000000}}], [], 0x8cffffff00000000}) 18:38:35 executing program 1: 18:38:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d2", 0x84}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:35 executing program 1: [ 1004.780842] EXT4-fs (sda1): Unrecognized mount option "Bnode_readahead_blks=0x0000000048000000" or missing value 18:38:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffff00000000}}], [], 0x8cffffff00000000}) 18:38:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d2", 0x84}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:36 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") sendto$inet(r0, &(0x7f00004b3fff), 0x0, 0x0, 0x0, 0x0) 18:38:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:38:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00007a00}) 18:38:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'Pnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d2", 0x84}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r3, 0x11b, 0x2, &(0x7f0000000040)=0x800, 0x4) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f00000001c0)=0x8, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r3, 0x11b, 0x6, &(0x7f0000000140)=0x1, 0x4) bind$xdp(r3, &(0x7f00000000c0)={0x2c, 0x0, r2}, 0x10) 18:38:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x50000007a000000}}], [], 0x8cffffff00000000}) 18:38:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d239084aa6dad12c2945a2c4e5eba574e1a14a06e0b2e63c70d3c9c74f3528340f5441befa61cfac765fa54709317ceb15c570b76ddc6e57261b932d978efba70eb010", 0xc6}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:36 executing program 1: clone(0x8000002102001ff7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000440)=@nat={'nat\x00', 0x19, 0x2, 0x148, [0x200001c0, 0x0, 0x0, 0x200001f0, 0x20000324], 0x0, 0x0, &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bond0\x00', 'ifb0\x00', 'veth1\x00', 'bridge_slave_1\x00', @empty, [], @random="ec105fef8388", [], 0x70, 0x70, 0xb8}}, @common=@log={'log\x00', 0x24, {{0xff, "6476bc8c36007624cd26aaa70a7530871f87a6b26a523a57375737d2b874"}}}}]}]}, 0x1c8) 18:38:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d239084aa6dad12c2945a2c4e5eba574e1a14a06e0b2e63c70d3c9c74f3528340f5441befa61cfac765fa54709317ceb15c570b76ddc6e57261b932d978efba70eb010", 0xc6}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1005.779932] EXT4-fs (sda1): Unrecognized mount option "Pnode_readahead_blks=0x0000000048000000" or missing value 18:38:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x50000002c000000}}], [], 0x8cffffff00000000}) 18:38:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d239084aa6dad12c2945a2c4e5eba574e1a14a06e0b2e63c70d3c9c74f3528340f5441befa61cfac765fa54709317ceb15c570b76ddc6e57261b932d978efba70eb010", 0xc6}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1005.937438] kernel msg: ebtables bug: please report to author: Wrong len argument [ 1005.955371] EXT4-fs (sda1): Unrecognized mount option "Pnode_readahead_blks=0x0000000048000000" or missing value 18:38:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00002200}) [ 1005.992297] kernel msg: ebtables bug: please report to author: Wrong len argument 18:38:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:38:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d239084aa6dad12c2945a2c4e5eba574e1a14a06e0b2e63c70d3c9c74f3528340f5441befa61cfac765fa54709317ceb15c570b76ddc6e57261b932d978efba70eb010420220a68ebd72757374341c21d74063d9b2721350ed9ab7b24dc237ee4d801fc6", 0xe7}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 18:38:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\"node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000007a00}}], [], 0x8cffffff00000000}) 18:38:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000074}) 18:38:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d239084aa6dad12c2945a2c4e5eba574e1a14a06e0b2e63c70d3c9c74f3528340f5441befa61cfac765fa54709317ceb15c570b76ddc6e57261b932d978efba70eb010420220a68ebd72757374341c21d74063d9b2721350ed9ab7b24dc237ee4d801fc6", 0xe7}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1006.679914] EXT4-fs (sda1): Unrecognized mount option ""node_readahead_blks=0x0000000048000000" or missing value 18:38:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d239084aa6dad12c2945a2c4e5eba574e1a14a06e0b2e63c70d3c9c74f3528340f5441befa61cfac765fa54709317ceb15c570b76ddc6e57261b932d978efba70eb010420220a68ebd72757374341c21d74063d9b2721350ed9ab7b24dc237ee4d801fc6", 0xe7}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x4ed4, &(0x7f0000000100)) 18:38:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000002c00}}], [], 0x8cffffff00000000}) 18:38:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\nnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d239084aa6dad12c2945a2c4e5eba574e1a14a06e0b2e63c70d3c9c74f3528340f5441befa61cfac765fa54709317ceb15c570b76ddc6e57261b932d978efba70eb010420220a68ebd72757374341c21d74063d9b2721350ed9ab7b24dc237ee4d801fc62b66cd5de4d1a13dffea4a7ba1431e312f", 0xf8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1007.098281] EXT4-fs (sda1): Unrecognized mount option " [ 1007.098281] node_readahead_blks=0x0000000048000000" or missing value [ 1007.292595] EXT4-fs (sda1): Unrecognized mount option " [ 1007.292595] node_readahead_blks=0x0000000048000000" or missing value 18:38:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:38:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff0000006c}) 18:38:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d239084aa6dad12c2945a2c4e5eba574e1a14a06e0b2e63c70d3c9c74f3528340f5441befa61cfac765fa54709317ceb15c570b76ddc6e57261b932d978efba70eb010420220a68ebd72757374341c21d74063d9b2721350ed9ab7b24dc237ee4d801fc62b66cd5de4d1a13dffea4a7ba1431e312f", 0xf8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:38:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'0node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:38 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x50000006b6b6b00}}], [], 0x8cffffff00000000}) 18:38:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d239084aa6dad12c2945a2c4e5eba574e1a14a06e0b2e63c70d3c9c74f3528340f5441befa61cfac765fa54709317ceb15c570b76ddc6e57261b932d978efba70eb010420220a68ebd72757374341c21d74063d9b2721350ed9ab7b24dc237ee4d801fc62b66cd5de4d1a13dffea4a7ba1431e312f", 0xf8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1007.619407] EXT4-fs (sda1): Unrecognized mount option "0node_readahead_blks=0x0000000048000000" or missing value 18:38:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff0000002c}) 18:38:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'i\node_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x100}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d239084aa6dad12c2945a2c4e5eba574e1a14a06e0b2e63c70d3c9c74f3528340f5441befa61cfac765fa54709317ceb15c570b76ddc6e57261b932d978efba70eb010420220a68ebd72757374341c21d74063d9b2721350ed9ab7b24dc237ee4d801fc62b66cd5de4d1a13dffea4a7ba1431e312ff5afe94aa3032f7c", 0x100}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x50000000000002d}}], [], 0x8cffffff00000000}) [ 1008.074567] EXT4-fs (sda1): Unrecognized mount option "i [ 1008.074567] ode_readahead_blks=0x0000000048000000" or missing value [ 1008.203696] EXT4-fs (sda1): Unrecognized mount option "i [ 1008.203696] ode_readahead_blks=0x0000000048000000" or missing value 18:38:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:38:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x100}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'i\"ode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d2", 0x84}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff1f000000}) 18:38:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x104}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000004000000}}], [], 0x8cffffff00000000}) 18:38:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x104}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d2", 0x84}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1008.614633] EXT4-fs (sda1): Unrecognized mount option "i"ode_readahead_blks=0x0000000048000000" or missing value 18:38:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x104}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d2", 0x84}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1008.781473] EXT4-fs (sda1): Unrecognized mount option "i"ode_readahead_blks=0x0000000048000000" or missing value 18:38:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x106}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:38:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'i%ode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x106}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00004c00}) 18:38:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000400000}}], [], 0x8cffffff00000000}) 18:38:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x106}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'i,ode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d2", 0x84}], 0x1}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x107}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:38:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000500}) 18:38:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000003}}], [], 0x8cffffff00000000}) 18:38:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x107}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d2", 0x84}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'in%de_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d2", 0x84}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d239084aa6dad12c2945a2c4e5eba574e1a14a06e0b2e63c70d3c9c74f3528340f5441befa61cfac765fa54709317ceb15c570b76ddc6e57261b932d978efba70eb010420220a68ebd72757374341c21d74063d9b2721350ed9ab7b24dc237ee4d801fc62b66cd5de4d1a13dffea4a7ba1431e312ff5afe94aa3032f7c5ab1815e9ebb6b", 0x107}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:41 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d2", 0x84}], 0x1}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 18:38:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x5000000ffffff8c}}], [], 0x8cffffff00000000}) 18:38:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:38:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00001f00}) 18:38:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'in,de_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d2", 0x84}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 18:38:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000005000000}}], [], 0x8cffffff00000000}) 18:38:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 18:38:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d2", 0x84}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700), 0x0, 0x0, 0x0) 18:38:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'in\nde_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d2", 0x84}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x5000000f6ffffff}}], [], 0x8cffffff00000000}) [ 1011.842932] EXT4-fs: 5 callbacks suppressed [ 1011.842943] EXT4-fs (sda1): Unrecognized mount option "in [ 1011.842943] de_readahead_blks=0x0000000048000000" or missing value [ 1012.009742] EXT4-fs (sda1): Unrecognized mount option "in [ 1012.009742] de_readahead_blks=0x0000000048000000" or missing value 18:38:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:38:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff0000004c}) 18:38:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700), 0x0, 0x0, 0x0) 18:38:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d2", 0x84}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'in\"de_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:43 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000e0f}}], [], 0x8cffffff00000000}) 18:38:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d2", 0x84}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700), 0x0, 0x0, 0x0) 18:38:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)='\n\au', 0x3) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d2", 0x84}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d239084aa6dad12c2945a2c4e5eba574e1a14a06e0b2e63c70d3c9c74f3528340f5441befa61cfac765fa54709317ceb15c570b76ddc6e57261b932d978efba70eb010420220a68ebd72757374341c21d74063d9b2721350ed9ab7b24dc237ee4d801fc62b66cd5de4d1a13dffea4a7ba1431e312ff5afe94aa3032f7c5ab1815e9ebb6ba9", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1012.440754] EXT4-fs (sda1): Unrecognized mount option "in"de_readahead_blks=0x0000000048000000" or missing value 18:38:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b0", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d2", 0x84}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1012.645236] EXT4-fs (sda1): Unrecognized mount option "in"de_readahead_blks=0x0000000048000000" or missing value 18:38:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:38:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff48000000}) 18:38:44 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000004}}], [], 0x8cffffff00000000}) 18:38:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d239084aa6dad12c2945a2c4e5eba574e1a14a06e0b2e63c70d3c9c74f3528340f5441befa61cfac765fa54709317ceb15c570b76ddc6e57261b932d978efba70eb010420220a68ebd72757374341c21d74063d9b2721350ed9ab7b24dc237ee4d801fc62b66cd5de4d1a13dffea4a7ba1431e312ff5afe94aa3032f7c5ab1815e9ebb6ba9", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 18:38:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d2", 0x84}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'ino\ne_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)}}], 0x1, 0x0, 0x0) 18:38:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d2", 0x84}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1013.400025] EXT4-fs (sda1): Unrecognized mount option "ino [ 1013.400025] e_readahead_blks=0x0000000048000000" or missing value 18:38:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)}}], 0x1, 0x0, 0x0) 18:38:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d2", 0x84}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d239084aa6dad12c2945a2c4e5eba574e1a14a06e0b2e63c70d3c9c74f3528340f5441befa61cfac765fa54709317ceb15c570b76ddc6e57261b932d978efba70eb010420220a68ebd72757374341c21d74063d9b2721350ed9ab7b24dc237ee4d801fc62b66cd5de4d1a13dffea4a7ba1431e312ff5afe94aa3032f7c5ab1815e9ebb6ba9", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)}}], 0x1, 0x0, 0x0) 18:38:44 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x5000000fdfdffff}}], [], 0x8cffffff00000000}) 18:38:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:38:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00006800}) 18:38:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 18:38:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'ino\"e_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d2", 0x84}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:45 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000048000000}}], [], 0x8cffffff00000000}) 18:38:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1014.317230] EXT4-fs (sda1): Unrecognized mount option "ino"e_readahead_blks=0x0000000048000000" or missing value 18:38:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 18:38:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d239084aa6dad12c2945a2c4e5eba574e1a14a06e0b2e63c70d3c9c74f3528340f5441befa61cfac765fa54709317ceb15c570b76ddc6e57261b932d978efba70eb010420220a68ebd72757374341c21d74063d9b2721350ed9ab7b24dc237ee4d801fc62b66cd5de4d1a13dffea4a7ba1431e312ff5afe94aa3032f7c5ab1815e9ebb6ba9", 0x108}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) [ 1014.490098] EXT4-fs (sda1): Unrecognized mount option "ino"e_readahead_blks=0x0000000048000000" or missing value 18:38:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x107}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'ino%e_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:46 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x50000003f000000}}], [], 0x8cffffff00000000}) 18:38:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x107}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80), 0x0, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:38:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000006}) 18:38:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80), 0x0, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x107}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1015.321318] EXT4-fs (sda1): Unrecognized mount option "ino%e_readahead_blks=0x0000000048000000" or missing value 18:38:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80), 0x0, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:46 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x50000004c000000}}], [], 0x8cffffff00000000}) 18:38:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'ino,e_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00004800}) [ 1015.902133] EXT4-fs (sda1): Unrecognized mount option "ino" or missing value 18:38:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:38:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x107}], 0x1}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:47 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000700}}], [], 0x8cffffff00000000}) 18:38:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inoie_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x107}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff02000000}) 18:38:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x107}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1016.420148] EXT4-fs (sda1): Unrecognized mount option "inoie_readahead_blks=0x0000000048000000" or missing value 18:38:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:38:48 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x107}], 0x1}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x100000000000000}}], [], 0x8cffffff00000000}) 18:38:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{0x0}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'ino|e_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000600}) 18:38:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{0x0}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d239084aa6dad12c2945a2c4e5eba574e1a14a06e0b2e63c70d3c9c74f3528340f5441befa61cfac765fa54709317ceb15c570b76ddc6e57261b932d978efba70eb010420220a68ebd72757374341c21d74063d9b2721350ed9ab7b24dc237ee4d801fc62b66cd5de4d1a13dffea4a7ba1431e312ff5afe94aa3032f7c5ab1815e9ebb6b", 0x107}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1017.169392] EXT4-fs: 1 callbacks suppressed [ 1017.169403] EXT4-fs (sda1): Unrecognized mount option "ino|e_readahead_blks=0x0000000048000000" or missing value 18:38:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x107}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{0x0}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x900000000000000}}], [], 0x8cffffff00000000}) [ 1017.359396] EXT4-fs (sda1): Unrecognized mount option "ino|e_readahead_blks=0x0000000048000000" or missing value 18:38:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x107}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:38:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inod\n_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff4c000000}) 18:38:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d239084aa6dad12c2945a2c4e5eba574e1a14a06e0b2e63c70d3c9c74f3528340f5441befa61cfac765fa54709317ceb15c570b76ddc6e57261b932d978efba70eb010420220a68ebd72757374341c21d74063d9b2721350ed9ab7b24dc237ee4d801fc62b66cd5de4d1a13dffea4a7ba1431e312ff5afe94aa3032f7c5ab1815e9ebb6b", 0x107}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:49 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000300}}], [], 0x8cffffff00000000}) 18:38:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x107}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1018.182556] EXT4-fs (sda1): Unrecognized mount option "inod [ 1018.182556] _readahead_blks=0x0000000048000000" or missing value 18:38:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)='\n\au', 0x3) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x107}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff74000000}) 18:38:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b0", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x107}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1018.349352] EXT4-fs (sda1): Unrecognized mount option "inod [ 1018.349352] _readahead_blks=0x0000000048000000" or missing value 18:38:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:38:50 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000004c00}}], [], 0x8cffffff00000000}) 18:38:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45", 0x42}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inod\"_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d239084aa6dad12c2945a2c4e5eba574e1a14a06e0b2e63c70d3c9c74f3528340f5441befa61cfac765fa54709317ceb15c570b76ddc6e57261b932d978efba70eb010420220a68ebd72757374341c21d74063d9b2721350ed9ab7b24dc237ee4d801fc62b66cd5de4d1a13dffea4a7ba1431e312ff5afe94aa3032f7c5ab1815e9ebb6b", 0x107}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff2d000000}) 18:38:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d239084aa6dad12c2945a2c4e5eba574e1a14a06e0b2e63c70d3c9c74f3528340f5441befa61cfac765fa54709317ceb15c570b76ddc6e57261b932d978efba70eb010420220a68ebd72757374341c21d74063d9b2721350ed9ab7b24dc237ee4d801fc62b66cd5de4d1a13dffea4a7ba1431e312ff5afe94aa3032f7c5ab1815e9ebb6b", 0x107}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1019.049517] EXT4-fs (sda1): Unrecognized mount option "inod"_readahead_blks=0x0000000048000000" or missing value 18:38:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45", 0x42}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x107}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x107}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:50 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1f00000000000000}}], [], 0x8cffffff00000000}) 18:38:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inod%_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) [ 1019.549455] EXT4-fs (sda1): Unrecognized mount option "inod%_readahead_blks=0x0000000048000000" or missing value [ 1019.719763] EXT4-fs (sda1): Unrecognized mount option "inod%_readahead_blks=0x0000000048000000" or missing value 18:38:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:38:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45", 0x42}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000010}) 18:38:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:50 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000001000000}}], [], 0x8cffffff00000000}) 18:38:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inod,_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea", 0x63}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea", 0x63}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000005}}], [], 0x8cffffff00000000}) [ 1020.165021] EXT4-fs (sda1): Unrecognized mount option "inod" or missing value 18:38:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea", 0x63}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1020.326841] EXT4-fs (sda1): Unrecognized mount option "inod" or missing value 18:38:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:38:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cfffffffdfdffff}) 18:38:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80), 0x0, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inodi_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7", 0x74}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000009}}], [], 0x8cffffff00000000}) 18:38:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80), 0x0, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7", 0x74}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1020.967245] EXT4-fs (sda1): Unrecognized mount option "inodi_readahead_blks=0x0000000048000000" or missing value 18:38:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80), 0x0, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff06000000}) 18:38:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7", 0x74}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:38:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode,readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000002200}}], [], 0x8cffffff00000000}) 18:38:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea", 0x7c}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00002000}) 18:38:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea", 0x7c}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea", 0x7c}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000300}) 18:38:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x700000000000000}}], [], 0x8cffffff00000000}) [ 1022.180033] EXT4-fs: 2 callbacks suppressed [ 1022.180045] EXT4-fs (sda1): Unrecognized mount option "inode" or missing value 18:38:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:38:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inodeireadahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x600000000000000}}], [], 0x8cffffff00000000}) 18:38:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000068}) 18:38:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea", 0x7c}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1022.989686] EXT4-fs (sda1): Unrecognized mount option "inodeireadahead_blks=0x0000000048000000" or missing value 18:38:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea", 0x7c}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{0x0}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000009000000}}], [], 0x8cffffff00000000}) 18:38:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode\nreadahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) [ 1023.481467] EXT4-fs (sda1): Unrecognized mount option "inode [ 1023.481467] readahead_blks=0x0000000048000000" or missing value [ 1023.576622] EXT4-fs (sda1): Unrecognized mount option "inode [ 1023.576622] readahead_blks=0x0000000048000000" or missing value 18:38:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:38:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{0x0}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea", 0x7c}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000002}) 18:38:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x50000008cffffff}}], [], 0x8cffffff00000000}) 18:38:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode\"readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{0x0}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4f", 0x7e}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:55 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:38:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4f", 0x7e}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1024.051648] EXT4-fs (sda1): Unrecognized mount option "inode"readahead_blks=0x0000000048000000" or missing value 18:38:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000600}}], [], 0x8cffffff00000000}) 18:38:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1024.150404] EXT4-fs (sda1): Unrecognized mount option "inode"readahead_blks=0x0000000048000000" or missing value 18:38:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:38:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4f", 0x7e}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode%readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000140)) ioctl$SIOCNRDECOBS(r0, 0x89e2) 18:38:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000002000}}], [], 0x8cffffff00000000}) 18:38:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8", 0x7f}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1024.889718] EXT4-fs (sda1): Unrecognized mount option "inode%readahead_blks=0x0000000048000000" or missing value 18:38:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8", 0x7f}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e92e7a74d2", 0x84}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000002}}], [], 0x8cffffff00000000}) 18:38:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_\"eadahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) [ 1025.349428] EXT4-fs (sda1): Unrecognized mount option "inode_"eadahead_blks=0x0000000048000000" or missing value 18:38:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:38:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8", 0x7f}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d0", 0x1}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000340)=ANY=[@ANYBLOB="696e6f64655f7265616461686561645f6666666666666666662c7065726d69745f00000000000010002c736d61636b66737472616e736d7574653d21707070302c6fedc9985a626a5f757365723d7b776c616e3073656c66766d6e6574306d643573756d776c616e4c2a2c736d61636b667368614000690eff6e6f64655f7265616461686561645f626c6b732c7375626a5f757365723d696e6f64655f7265616461686561645f626c6b732c726f6f742c66736d616769633d3078303030303030303030303030313030302c006093cb3e740d6c93564423e7863dc67b894f9da5e7362602a4f9c12ce5f2ee638c901f67807d00000000000000000000000000005d76d8f02e8a46911d6d1260ca28f7e1f8ac22f31e0b77c3889221085168e977cbc3f5d87a1aba1366d06bc87a9fc4ce80de5aa6d68e67045239140aae304cfbee920dbd20b8ea5b56964f0348e36b590670c73a8399c2bc434325612a38d7a8a98cd773145c396d6c02e9057340a711b7d4deea0445cb99e37adb76bf849fbc4fcddc38ae28f460b9f4586781f1967b70743de42d3aa23346828ed5d267cfda1eb4da80bfb801dfbc7075b1f1470f22364702f843342c47015a44f4faa73c3c93c1e12e"]) 18:38:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000007}}], [], 0x8cffffff00000000}) 18:38:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_%eadahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) [ 1025.810082] EXT4-fs (sda1): Unrecognized mount option "inode_%eadahead_blks=0x0000000048000000" or missing value 18:38:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d0", 0x1}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 18:38:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d0", 0x1}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1025.989847] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_fffffffff" or missing value 18:38:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_,eadahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b4510", 0x43}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:57 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) r0 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0xc2040) accept4$rose(r0, &(0x7f0000000340)=@full={0xb, @remote, @bcast, 0x0, [@remote, @netrom, @remote, @rose, @bcast, @null]}, &(0x7f0000000380)=0x40, 0x80000) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f00000001c0)=0xfffffffffffffff9, 0x2) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000), &(0x7f00000002c0)=0x4) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x100, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000140)=0x3, 0x4) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={0x0, {0x2, 0x4e24, @empty}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x25}}, {0x2, 0x4e23, @remote}, 0x8, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000200)='erspan0\x00', 0x8, 0x9, 0x200}) 18:38:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000010}}], [], 0x8cffffff00000000}) 18:38:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:38:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 18:38:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b4510", 0x43}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_\neadahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 18:38:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b4510", 0x43}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4a", 0x64}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700), 0x0, 0x0, 0x0) 18:38:58 executing program 3: mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000003c0)=0x0) stat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) r3 = socket$inet6(0xa, 0x1, 0x5) r4 = syz_open_dev$swradio(&(0x7f0000000540)='/dev/swradio#\x00', 0x1, 0x2) r5 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhci\x00', 0x10002) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/policy\x00', 0x0, 0x0) r7 = gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@loopback}}, &(0x7f0000000700)=0xe8) getresgid(&(0x7f0000000740), &(0x7f0000000780)=0x0, &(0x7f00000007c0)) r10 = socket$inet_dccp(0x2, 0x6, 0x0) r11 = syz_open_dev$sndpcmp(&(0x7f0000000800)='/dev/snd/pcmC#D#p\x00', 0x6, 0x800) r12 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000840)={{0x3, @netrom}, [@netrom, @bcast, @bcast, @rose, @remote, @null, @netrom, @bcast]}, &(0x7f00000008c0)=0x48, 0x80800) r13 = syz_open_dev$midi(&(0x7f0000000900)='/dev/midi#\x00', 0x7, 0x200) r14 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r15 = socket$netlink(0x10, 0x3, 0xe) r16 = syz_open_dev$sndtimer(&(0x7f0000000380)='/dev/snd/timer\x00', 0x0, 0xffffffffffffffff) r17 = syz_open_dev$mouse(&(0x7f0000000980)='/dev/input/mouse#\x00', 0xfffffffffffffffe, 0x100) r18 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/ptmx\x00', 0xb54bfe30c9e60e7a, 0x0) r19 = syz_open_procfs$namespace(0x0, &(0x7f0000000a00)='ns/uts\x00') r20 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffff9c, 0xc0184900, &(0x7f0000000a40)={0x0, 0x4, 0x1, 0xffffffffffffffff}) r22 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000001e80)='/selinux/user\x00', 0x2, 0x0) r23 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000001ec0)='/dev/video2\x00', 0x2, 0x0) r24 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) r25 = socket$inet6_dccp(0xa, 0x6, 0x0) r26 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000001f00)='/selinux/member\x00', 0x2, 0x0) sendmmsg$unix(r0, &(0x7f0000001f80)=[{&(0x7f0000000300)=@file={0x1, './file0/file0\x00'}, 0x6e, &(0x7f0000000380), 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="2000000000000000f1b7ffe42e468c0100000002000000", @ANYRES32=r1, @ANYRESOCT=r18, @ANYRES32=r2, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r10, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r11, @ANYRES32=r12, @ANYRES32=r13, @ANYRES32=r14, @ANYRES32=r15, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r16, @ANYRES32=r17, @ANYRES32=r18, @ANYRES32=r19, @ANYRES32=r20, @ANYRES32=r21], 0xe2, 0x1}, {&(0x7f0000000b80)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000001e40)=[{&(0x7f0000000c00)="cdc975eb9028df1eab3a7643fa7cee4a6767389e1c7ee7518b92ec3fd0664e620e82edf7317d9cf7a69e75624f8ac0c763b7b724d9fd869c2e4be24e287ffbd0f606b3f992a005125b0c877a06cbe660025aadb0c6f4dc8000594271cd2a1885546a465a2b55c6a3feaab18eac81051f061275f105b5b302e2087d06574b275c8737a38d1885a50b3dc8c2378f238cadd18d8246a57a556d74de1b40414c3c228444817601d318e1a1996ace7c8c24dcd89d3622d3b14037745c805c0bb906bbb8f7f110ed4830a69642087305fe3fe44caf1906a394baa6ee66c070c150bdf54a1471b6b56cd1a1af6e63dd7a69e0aeb4343e2b889e0b7fd59b4e67d189f24e34c471d7cfb3e00c3d062374cda869dc3599a09fc86c113a4f85d63adbc522a212bf78e3e81d8f891e8e9ff6ded4364350e5492fda9297cda2d1277ab035efcdc439af992eab8f601ec65865f99d9f9c5181dde88148ca4ef223968f2b6d0513f66d30a80942ad069d660bf4e5af79e3706cde5480710a1d093ec4f34c7aa188a9e3e91734ade857a8f49d3b20f9d01c4ebbe175b3d74ad0458f3802aaf2ffebb6b62fc2eb79f1acf01bbac0605e0d5b22f600c9b0d1512189d700083d71a0158f247454cd35f7b9be9282e193d6a060cb955e1e1e1479ad0fe2ac161c333ac8ccd6b74208315c7f4af57d3bf171f2649706c21b74788d063be717b7db3ef3a402aa97910037d34cd10978ab5bc078e1ff0023e420449612637eb6d75a53b0a2eaa9c0cd60f44c4279ecb9796f3ac94cf19cd4cdd1587fcc64c23a568e544d1c95772a7c74a7f7243ff40e6854dc05581f8ea88bf514f3e0bf3f1ab5b6804a6d66c76d6e11616775886967910c19b76d7a2f0c4d26f094399889a6db5b331288665d6310d11c69b0bb7fa1137d0c41043f6108c214bb4a16a28b43c6bb1cc9c62202b47416b8eaa5dccd093ecd905302466366f6b6c7f9f206328c88eb79e362c568512c1f76754fcb3b66ad894391a7270416790a8038dac23b98da2dba3327986e2277a4c41fb776d11a3b39a8e10b554f1c5cbd5d9ed15e6536be882d9476a8197dc4ef8d5a2ea0a5b69344001bcb4138cd6a42406e47a852668364617c31d9f010112c51ea2d556bf1bcd69a37fc5204af64621a9b3aa83a5d7bca2c30136062528939a3f92e3ac8a0b4c06e030150d4a3b21b7f26cdc08d5be0f1472b391c9065773fd62031e6e3b3e75d1f5d8006066735db229bb6fb5fa342562fbcca2cf212f56ab67ab2c7388084af9177636daf8d3ea269e90c82e3f951496cd9063deefb376da31c68ddfbf13d645bb91b4800ea35bde107ddc9735c34abd2a44970760c703864ce965811277138655c54cea4bdd19e2a947f8d902eb2272acb3b8b101b4a27f2d7e0ce5f77b9d3fed682e37ae4d64fee946546aed4c42d399498c2841208d5ae0a8fec1826961d9688b66da9e32d9540aee406a1adf305e415aaf0b68d9aa03afa2dd92b34fa5a05c248c6380f2f25a6fefa0f01820eef106204d20947b895be9ae53025754eecbd91c71a237ec702c7aa3416527f7cf3b31205ace865a3eaeecbf7d73939b6a16a282a39407586bcd6e984af9dba0e3a0ec24829c7d4c72a276415a3b4d9137d207bae6700bfe44de982df75028f0ed8fdae0cdb972c01e59a8e2900914b4e2e4ec4f894e67af14b6184dba8f7b0a7beaec81fe3b66ffb9624568f463104694e63401e787cc43360cd9d661fffec83a54aedc2b232b48eee07db4ffe2fa4abbe692e0a9c93d3300671097a6c122632d59dc4f98497eefb8f399471324feda255803bdafc297bc8cfcea010c178a0120f00f84e1fbfd602a40b907a1f6c4e3736978c3daf072f971ad914bc68720562b58d2c5ab6e9afb3f3455e75cc2a3dbbb6d11cb754ef650416348ff94b66e4fd7b80343ae198e76d545cf54adacde6c37c0f7f543e7953a8e45936744a3dbd9e181e9c021a4a51a1d7a7033ef0a15991a8720a144dd92c37e2c5620d4f012fa33fad33dc10ba8af9874618bda715b74f7ddbfeffe07e4a48800b674eb65b713d955987e189fa5ebac76c926bbe5cde0dc61b2fcf264aeb4a1d32db52eeea735a980a2e6c118b712fe9db7f659fa0839c141cae5b723f7056f8d8135d33f880ed1898706cf997ca40d422dae6755d4f8a8d8eb90dfa6ecdacdc96165ee48e849975f9caac510899b42d9d65f921e9ead8776c55c7f3dc91742d398b1d0a4d1e766101d2174dcb51568af2bae31cdf2bd9608b100fd49bbffea188aaa424a1ee6bf54b69df3c66f83ab220c37b1172fc01940437a2e4c4c67dae0240fbeb88c0eca891ba6f0acb14f4e3df8610a07e3817a3da66623b29797748d6a2124072af49a20b76dd1d9492c1f67dab9232c44f1c61d0754eff8e818cc1327b2f0f2691ab0390e1abe7462234374c033e88f01113a8be84c122fe811a90b0f04208796a191b88645997fb12157282487f06c7fdf07a14b8956dd16fbf196cbaf4672fae5c99c3298af39f4056f0860114ef7f46af3bdd910552738816a258fd82de26040e3956ae9cc36a6964d033255d8fe9f7d2fdb5184328153bfa81ca0484f80e6c8f23642e07faa86b7f7c0889894caef9dddf900c6eab21fb58c8946d26f642120176258594a7c3964e3836f9dcf4124344ec31256508b72fc709533185f4b2840c028d535661bac76b883e7d5f6839bff78334ce69763a632fcdf89bef82a6e1eda5d0351d4ceadd6dbca64b6e3c7e2e661abec2cbcd8299a8f68676f6f817c2cb9c950b56e6e6fcd6e8b67c56fcf5ea0dba82e41f253aef078d6dc04d7c458e2a3144c09e0b73a058c193efe1e3620b138b269cb132c332f4dbd48f9780366b3c9eaef0c94ff8caf7063229610a1f7e2b3898c20a083de8c16158d4b86f61bddc09c2bf1bffb02d508234c4bcdfbd34cb296825d5e6afb48797ac851447034490dd2b2229ce9a4425d50030a4257bab81acd2bfa1466bff63589066bc82cd9b117550fc05067661cf7aa37be28346cca0902f328002756f72e44f94de6b79abb83eb6dd766ea26b5c656e4c536fdf8bfb7857544632f22ef4a4145c87ac87b021f9554c1c35c890ed2187dcb7ceae7f4179b5e009b80be97ef5674b70102be924b1839dff31c5bd4cc9ba028869f51857cfd337ef1bac63aad929b268dfbde2929f75f2efeb392ed2e6147e60ccb55c310597a7fcc885eae92f63a62f5393abad1e0204b945c48529718667c25ccf52cc0d13fdf058d1858c29816138889bca82bb1944a9502b72200d65975da88174659a8d84e11981cbbd007277cc3649d650538ec1bcd0f8c4270adf2b8bdc44f4bea496c18ffa3d595d918ff598d3d3d84544d55cb24187c1efe959a4553bc87dd6ef06554f798e8c042877265909885406f63eccf6ea6cd93fa50aac24c8634ba96d56f9068baa9cec276af34461dc6eaf60a75e4fee9d72abfd2d9da935a66490b105c3f83d302059818eaed2fae1b0f666ff4987cc4f5a22b5ef443f825370d655d6e9a6b6608dc79ffa40f63aed011ae4232a98a9e317ece856881ba29eb465c76edf68294e68fbcb82030007ada201013ab5f3e7a5f3a7907bd2e3ae82f9c56be1cdd23cdf6d7cafe77d5fd91f9bef62186ae3d654a76e42a5d85e2e72a98504a03869e33f33ff8dceb214a236aba5aa5b2b9054bad98c51ef535a2f415c6276f03ff48003eda0fb9976abc24881926d945f1088c5345f8fbaf100b752ff10de07df65f029482348be1113b6f9a48699ae215500a7df0f39ed3405163d537e6e1b13b2a59ff470ec2a1ff4270cf429d58f7fc8a1cfcf71ed580e18c00d5e1a822049a5baed01ca3b63e91f76d1b8dae0ae0bca6f9f009afcfc713119c6814026997f4cfd3bc23f7149ceb0b92d0cae8c324d584822bdf236ec4db0d5c6e97a7138695c8bd8d8bc0045dd35a252c0adba148b1431b93b8a83a739d1af86ef1cb7e2436effd124e90fdbebe20e98a6ab4909e0ff97fa2b3636b16fe655f1766bc3990785903afe8097f50eb71b100549faf68f24a2121219130c2f7fc9fe68b03d5257f4163fa408f0f71fa7eedaee7b657baa85b9052c5e26625cd27b14158ea66a85b7e10d515de1f1f3799c81d4bb2922b02f91624a5688df1bba952b5e3f131e8f3bd6cc65df81b0ba6a4eec8ea60c30d8e4ab6ac6fe5017b6fc381cca98bf961f7905fa2d6001e3f0e2ec9853a3f0ded38a2c7bddea24dfb825e8f4a8a7e036fe8459fca4291222567bb96ecc777ff2906ab9d67b67491e6e961304d779048639d802e50fe55d2930af8c44764a21d08858fafd83d5e99eee13db06e271b27e0dc9455212bd19317a34b35f7d551b006a10bd59f3d9d9531b6d357f6efb8233b0976025c1ca3077a8aad3570c5a8eed32b169a827e7d61f10b056d076ccb7da5fb9720b0ddd9c160c362d6b006aeaf3453e9909e73484c2dacd29e7a05a5c334de6642681db46a3c236f1160477a7114e5b0b887c9303ba4f22eb4606d95c628b946fc462d8253bf3bdf040d1099a3faee4f6b058b6cfd50ae9acab4f05974b2558e7980ac298c6c37844baaf382d1fa6a73f3a5abc1bf2e3a834eca832aacf44c3b4759f26a835f36f1f8d7a4255028bff2b380bdd1647276cb90cec3b9392a5350aad476792691395a2082eac09844fdaa8d257fd3d6b42f1bcea5ff86a6a754246fbc8be38d3be65e593e1c320be487c6946ed0fba8b6294fa349fa3ef9b4d674b7f986523a803d49b412dfb2ecf8bf8ba1d17f7b67d277e71bdd17e93f849be894164282cb455b203167d30e142ee9172ae959085d6e8bcbd1c88b84c2e61450fbdf3f6106fa4e966d093e9633d32e5e08f5cb88db68918276881c711af97de960a09138911716b33f08f01d0ec862ea681de76e454babdbc58f10f5bf133c4239ab949aeef7df8c39a26b48041d1de5d14f73125f4993e8d594955a2b2d688b590973cad0e6b802909a7d2545bffd525fecb2706c4ef889b7ecc8e60e43e62cb90178d8dd0b1765947b3f96c6c7750a0d0ac977f49654cb26da0ed4229fe54d5d53358e02d4e2f8a108e4fd73df5a1be24e6ec9ef1f9a6598d3bc1f91e43a2780d6f003110061c02c7ac1e957f05073ec7e7e283913e17d972bb328268a78edec9027421e72cb4c2e707f24e1b5044bc0c164dc61bc830b9e58830afee0b34e3856cafc2ff0a9b1c3a72a3b9b63e1e9e0396cc492cdcda69d4cc151d14d4930aa25a8d2f35605d6f34c210b444600086bdf2e03399c2c83ca9bd47db30a5f93ab45f7a8cf08be829bdc2dc02a130ccce0bcf3d0b89bda7e063f483e8ce283505dfef3ed4e82a8b5591d1f066f00ee21131249bf6fd3157c630e30435e0ef6e9987d6f062fa81e0c96c8766cd0ec934132447e76397b95e21a84c4a4592c45ee9ab93445e42c2a90661a5cd0ce9d03d8e30924e4bc4d5831b3342381e1b00a9165d4a8f2292611834d4cf90c4851d6eda84ea8647597cbf29ee0340b13ab50fb5852f7a4b9627e11f071ec5b7d142506035c73fe063d9e99f22df715dc35e974084cb4e218480adc49aa8a8eff86b757ad195263a259305d0bcdd613e061d8a9d3768ba744d00781c96cffbe4a90c8fb02299100a57b3d11a40b25508fe02e941ebe61f94884cc5dfb9da9f89cac118a7cf45e45075ad4804b1750f0a63e6408ac101e0acb0722377734d58c01bb309c562977cf45e0052f3d658e2a0fdcea4ed1b44adac686964485532b3f0bb0f95", 0x1000}, {&(0x7f0000001c00)="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", 0xfd}, {&(0x7f0000001d00)="78476e30a50d069c0de495b5494a4ff28aabd005e0fbfb977d8389cea1f89f0a787e948771e0edcb469ab54c7601631eb1a06482d6e1d4401e388ec683b7f2c1623e8e0f0b3070c83b78838c8aae7fd2e74ad5f2e4691e67303e3e37fa0d47d9740f1057f17f52282d027087740173a67bf1855ae93af48d024abff3b448b8e2d96c43b1af963d6690d1b0fc7c7a05b693fba1335fae0a902127e4a174686c70181fb4006b84d0bd8cae9554c3e180ff6683729485e2099d8122a6dc982020f3771ed121ab98989490c4cfef8243c1a65a31bb0a7ea05410d982f90a7876333ab92c775fe28560d89335e2d31fbcabdb02990d01a772c73e6d1379", 0xfb}, {&(0x7f0000001e00)}], 0x4, &(0x7f0000001f40)=[@rights={0x28, 0x1, 0x1, [r22, r23, r24, r25, r26]}], 0x28, 0x40040}], 0x2, 0x4000000) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000940)=ANY=[@ANYBLOB="696e6f24655f726561646168736561645f626c6b73b4f93d3078666666666666666666666666666666632c00"]) r27 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x2000, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000180)={0x0, 0x3}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r27, 0x84, 0x72, &(0x7f0000000240)={r28, 0xae87, 0x20}, &(0x7f0000000280)=0xc) r29 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x8000, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r29, 0xc004aea7, &(0x7f0000000140)=0x10000) 18:38:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000010000000}}], [], 0x8cffffff00000000}) 18:38:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4a", 0x64}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4a", 0x64}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}}], 0x4000000000001b7, 0x8, 0x0) 18:38:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_r%adahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700), 0x0, 0x0, 0x0) 18:38:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7", 0x74}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB="696e6f64655f72656164616865610300006666666666666666666666662c0000000000000000000000"]) 18:38:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000006}}], [], 0x8cffffff00000000}) 18:38:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700), 0x0, 0x0, 0x0) 18:38:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7", 0x74}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1027.890387] EXT4-fs: 4 callbacks suppressed [ 1027.890441] EXT4-fs (sda1): Unrecognized mount option "inode_readahea" or missing value [ 1027.969819] EXT4-fs (sda1): Unrecognized mount option "inode_r%adahead_blks=0x0000000048000000" or missing value 18:38:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7", 0x74}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 18:38:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000068000000}}], [], 0x8cffffff00000000}) [ 1028.074072] EXT4-fs (sda1): Unrecognized mount option "inode_readahea" or missing value [ 1028.211049] EXT4-fs (sda1): Unrecognized mount option "inode_r%adahead_blks=0x0000000048000000" or missing value 18:38:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x20000) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000003c0)=0xe8) r3 = getegid() chown(&(0x7f0000000280)='./file0\x00', r2, r3) r4 = syz_open_dev$dri(&(0x7f0000000e00)='/dev/dri/card#\x00', 0x100000000, 0x2000) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000e80)={0x2, &(0x7f0000000e40)=[{}, {0x0}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000fc0)={r5, &(0x7f0000000ec0)=""/226}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f00000001c0)={0x1, 0x1000, 0xe5ef, 'queue1\x00', 0x6}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000b00)={0x0, 0x0, 0x9, 0x0, [], [{0x10001, 0x0, 0x101, 0x2, 0xfffffffffffff001, 0xe7b}, {0xbaab, 0x1000, 0x80000000, 0x1000, 0x8, 0x8}], [[], [], [], [], [], [], [], [], []]}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r6 = getuid() pkey_alloc(0x0, 0x1) r7 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x8, 0x10000) setsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@remote, @in=@multicast2, 0x4e21, 0x0, 0x4e20, 0x9, 0xa, 0xa0, 0x20, 0x33, r1, r6}, {0x400, 0x100000001, 0x9d5, 0x100, 0x1822, 0x8, 0xa491, 0x314}, {0x2, 0x9, 0x9, 0x5}, 0x8000, 0x6e6bbf, 0x1, 0x1, 0x1, 0x3}, {{@in=@broadcast, 0x4d4, 0xff}, 0x2, @in6=@remote, 0x34ff, 0x0, 0x0, 0xfffffffffffffff7, 0x9, 0x0, 0x3}}, 0xe8) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x10040, 0x0) fanotify_mark(r7, 0x8, 0x8000010, r8, &(0x7f0000000140)='./file0\x00') lsetxattr$trusted_overlay_upper(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='trusted.overlay.upper\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="00fbf40204ffad0e559d2f31ee4c81dff10c2184647ec4eb0b7bac9ef8c0b90d586d2919b68d176cf01a9a393b544c96caecf913ec59c02862929a9bdae76b83ae8eeda9b1338bd80674a30f4a3f7487cf8ac825e49b0b5c50242b88f4202f1d1b951a38b3a1d7fa42c04afe8f4a2a510262fe2235b29abcdf292d1dede6ed1ac24ae185f6f212a40218eee657f03a3097e99db3e0616a371f8041a047f173d0708e48e283871937bb82dde0289a37e6edadfd8355a316dc1418b13c227ab00edec29a42286eb1404af842864ae85a99ee067aff38023fa186d7392d3cfcc1574947410333cb46dacfef990725d383ce00000000"], 0xf4, 0x1) syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file0\x00', 0x100000001, 0x4, &(0x7f0000000840)=[{&(0x7f0000000580)="706c841228d6737749819fc40a7182c2f4141586bc28fb3a088752fd5648f082d331c90c8733a4384b97f7b40157161c69d967459dffaa203b99b4524c4dd96676722a0af2f0913a3c223fb83e7001695e6d77892c85576a9361809538309143d00fbc838215033d3bb705e555148acc01ad49bb254c64348b46cdf83d3582fcf04c395875f235e48cdb1b5d3c0542838ccdd891ba1c4b1f7dea017f7c05c832f89b6b30e4c2fbed7451556b76abe35aa22b", 0xb2, 0x8}, {&(0x7f0000000640)="c7cffe97074f57201f76c24168e8d9ef4750d913c2ae16c89aa09fe4ed2d712154af8f0aebabba8bcb3a8cc708a90ef367e641e733844ae3075f918b6861b785b448530a94b4c70b7820d77b7a12ee74", 0x50, 0x89}, {&(0x7f00000006c0)="9cf48b444269bf0a014bb26063830d154d532bd597fd6c0bc8a6f768263532fef5bd33feac0d878ab52d778d30eff16f100455e1695c8660f29e477bc10a9f13ce099d79b95bd722d75368e036e88f90f48befb3859e0d8540c9dd8acf5f51f8a75c4a0181fb211574abc53801e583fe88bcccdc32da5eda0f15ca5c9fe193733690b28f70f95be25f25c69f88dd908da9200154da9e2c781c6c9dee1e3d6bc810e97ea1b5b0d926cc70", 0xaa, 0x9}, {&(0x7f0000000780)="52938c2dc68b74ece333902720b6c224460670bfbaaf8fbd0daad5335b8901df7f8fc8ee98ad0e70a3e900923c9a44bf4d4f51ff357a1f517901416831318c1115a5f7de554b9683306349b7dbcbfd0996a6713a09b288eb5f879bd2213f89492fbf75ccc513bbd7994b3786d8c78c27deade146c9b0a7b6805b168630c0eeb638e53aee1b27", 0x86}], 0x800004, &(0x7f00000008c0)={[{@utf8='utf8=1'}, {@uni_xlateno='uni_xlate=0'}], [{@seclabel='seclabel'}, {@subj_role={'subj_role', 0x3d, '/dev/vcsa#\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'eth0em0,proc/)ppp0'}}, {@euid_gt={'euid>', r6}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@obj_type={'obj_type', 0x3d, '#::mime_type'}}, {@obj_type={'obj_type'}}]}) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x3ca, 0x0, 0x100020, &(0x7f0000001380)=ANY=[]) 18:38:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}}], 0x4000000000001b7, 0xfffffff0, 0x0) 18:38:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 18:38:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea", 0x7c}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_r,adahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:38:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000074000000}}], [], 0x8cffffff00000000}) 18:38:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)}}], 0x1, 0x0, 0x0) 18:38:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea", 0x7c}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)=ANY=[@ANYBLOB="69a9020000000000006461686561645f626c6b73598111eadf1b1192f6493525397f3d3078666666666666666666666666666666662c00"]) [ 1028.764303] EXT4-fs (sda1): Unrecognized mount option "inode_r" or missing value 18:38:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea", 0x7c}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:38:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)}}], 0x1, 0x0, 0x0) [ 1028.905350] EXT4-fs (sda1): Unrecognized mount option "inode_r" or missing value 18:39:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_riadahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:39:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x50000002d000000}}], [], 0x8cffffff00000000}) [ 1029.003506] EXT4-fs (sda1): Unrecognized mount option "i©" or missing value [ 1029.255827] EXT4-fs (sda1): Unrecognized mount option "inode_riadahead_blks=0x0000000048000000" or missing value [ 1029.439219] EXT4-fs (sda1): Unrecognized mount option "inode_riadahead_blks=0x0000000048000000" or missing value 18:39:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}}], 0x4000000000001b7, 0x700000000000000, 0x0) 18:39:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:39:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)}}], 0x1, 0x0, 0x0) 18:39:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='inode_readahead_blks=0xffffffffff,\x00\x00\x00\x00\x00\x00\x00']) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2, 0x83) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000001c0)={&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000140)="18b6d5b3ee22f7ad3e8ef046f177b91c2b77d788b9ec0f209ded221484ce4d101bd0538daeb0f009ec079a84c086404832c07ad1db49cdecdd08cb0010f256514cca93867aa18314f265a827ebafe478c2f2f5b85b0cb53bc69e7cee7424b663f7a776c4c9f8ad0e69479042b0796fc8041133187f39774048b3bac202", 0x7d, r0}, 0x68) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) r1 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x7a9, 0x200100) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000340)={0x3, 0x0, 0x2, 0x8}) ioctl$DRM_IOCTL_AGP_BIND(r1, 0x40106436, &(0x7f0000000380)={r2, 0x9}) 18:39:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_r\nadahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:39:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000068}}], [], 0x8cffffff00000000}) 18:39:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 18:39:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea", 0x7c}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1029.860275] EXT4-fs (sda1): Unrecognized mount option "inode_r [ 1029.860275] adahead_blks=0x0000000048000000" or missing value 18:39:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 18:39:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getegid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x8, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}], [{@pcr={'pcr', 0x3d, 0x1c}}, {@euid_gt={'euid>', r3}}, {@obj_role={'obj_role', 0x3d, 'ppp0ppp1'}}, {@obj_type={'obj_type', 0x3d, ')trustedwlan1#vboxnet1posix_acl_access}{,cgroupselfvmnet1nodevmime_type'}}, {@fowner_gt={'fowner>', r4}}]}}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:39:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea", 0x7c}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:39:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_r\"adahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:39:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}}], 0x4000000000001b7, 0x8dffffff, 0x0) 18:39:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 18:39:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea", 0x7c}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:39:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x5000000fffffdfc}}], [], 0x8cffffff00000000}) 18:39:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f00000001c0)=ANY=[@ANYBLOB="696e6f64655f5465616461686561645f626c6b733d30786666665aa0c0c317648b66666666666666660cf25ca85db753d6d3b5f8f481be4d25ae98f5697949c31ff0d8f25286d32e74d50552cc57681a39798b0a791d9e460f03940092602fa5c5fb868bcf2083496e4ca0f38db6eaaa173750310988be96f68b7e60c640d5cc3d5383e7ea18d3"]) 18:39:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_reidahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:39:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4f", 0x7e}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:39:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}, 0x0}], 0x4000000000001b7, 0x0, 0x0) 18:39:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000001f00}}], [], 0x8cffffff00000000}) 18:39:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}}], 0x4000000000001b7, 0x700, 0x0) 18:39:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:39:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4f", 0x7e}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:39:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_re\ndahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:39:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4f", 0x7e}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:39:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8", 0x7f}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:39:02 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f00000003c0)={0x0, @reserved}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2000000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) socketpair(0x5, 0x80007, 0xac14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e21, 0x2, @local, 0x3}}, 0x5, 0x800, 0x3, 0x4, 0x8}, &(0x7f0000000200)=0x98) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000240)=ANY=[@ANYRES32=r2, @ANYBLOB="cb0000005ca90dffa75091c196c1340a2c8a515fb9dfbd02418e931028813b1ce6781cb7509f54cbccc2604424019f04370bafc890d6c38a0dcc6a3ad44143d709ca3448acd55484b44e9e1512608c0f7c9771703371dc11909de03e12bccdfe4239e2c983a7e39e0a64f770e753b1bad3be33dfa0551ae458a89a8428d2dcb524b9061a1627e655e37e06c6cfc0bb43e2fd11e7711651a0b7441077a34764c266025fd6ee2b8e5dfb39eb0e22a184526e1af6c4570477e57de5668c4437b0d44488abe13e3456b28367f9d3ede6bb"], &(0x7f0000000340)=0xd3) 18:39:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000900}}], [], 0x8cffffff00000000}) 18:39:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8", 0x7f}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:39:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_re\"dahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:39:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8", 0x7f}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:39:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8", 0x7f}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:39:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}}], 0x4000000000001b7, 0xf0ffffff, 0x0) 18:39:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:39:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:39:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000002d00}}], [], 0x8cffffff00000000}) 18:39:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_reidahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:39:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_re%dahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:39:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 18:39:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4f", 0x7e}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:39:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 18:39:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffffffffffe44, 0x0, 0x0, &(0x7f0000000400)={[{@data_writeback='data=writeback'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [{@smackfstransmute={'smackfstransmute'}}, {@obj_user={'obj_user', 0x3d, 'ppp1'}}, {@subj_user={'subj_user', 0x3d, 'trustedmime_type'}}, {@euid_lt={'euid<', r0}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@fowner_lt={'fowner<', r0}}], 0x8cffffff00000000}) lsetxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000180)='inode_readahead_blks', 0x14, 0x2) 18:39:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 18:39:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x700000000000000}}], [], 0x8cffffff00000000}) 18:39:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}}], 0x4000000000001b7, 0x680e, 0x0) 18:39:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700), 0x0, 0x0, 0x0) 18:39:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000004800}}], [], 0x8cffffff00000000}) 18:39:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x400, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000140)={0x18, 0xffffffffffffffda, 0x4}, 0x18) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB="696e6f64655f7265836461686561645f626c6b733d3078666666666666666666666666666666662c00"]) 18:39:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_re,dahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:39:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000005}}], [], 0x8cffffff00000000}) [ 1032.924860] EXT4-fs: 12 callbacks suppressed [ 1032.924871] EXT4-fs (sda1): Unrecognized mount option "inode_reƒdahead_blks=0xffffffffffffffff" or missing value 18:39:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700), 0x0, 0x0, 0x0) 18:39:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inod,_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) [ 1033.030257] EXT4-fs (sda1): Unrecognized mount option "inode_re" or missing value 18:39:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700), 0x0, 0x0, 0x0) 18:39:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) [ 1033.205757] EXT4-fs (sda1): Unrecognized mount option "inode_re" or missing value 18:39:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000006800}}], [], 0x8cffffff00000000}) 18:39:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_rea\"ahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) [ 1033.559758] EXT4-fs (sda1): Unrecognized mount option "inode_rea"ahead_blks=0x0000000048000000" or missing value [ 1033.704497] EXT4-fs (sda1): Unrecognized mount option "inode_rea"ahead_blks=0x0000000048000000" or missing value 18:39:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}}], 0x4000000000001b7, 0x10, 0x0) 18:39:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 18:39:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="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", 0x106}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:39:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x200000, 0x0) write$P9_RLERRORu(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0d0000000701000000050000000d8660dfdb3f287e1f312f049c920b41f4d7d6"], 0xd) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0x900) openat$cgroup_subtree(r1, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000180)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x4e23, @remote}, {0x2, 0x4e20, @remote}, 0x100, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000140)='sit0\x00', 0x9, 0xd9, 0x2}) 18:39:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xa00000000000000}}], [], 0x8cffffff00000000}) 18:39:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'\vnode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:39:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 18:39:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_rea%ahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:39:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 18:39:05 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) dup2(r1, r1) 18:39:05 executing program 3: lsetxattr$security_smack_entry(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='security.SMACK64MMAP\x00', &(0x7f0000000280)='\x00', 0x1, 0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) r1 = open(&(0x7f0000000300)='./file1\x00', 0x60900, 0x8d) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000340)={0x2, r1}) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000000140)="9d27d928e4233f33c5439cb79e2c199c31d30da8e5c2d2b2e003e5c04d64ceee0e6223582548d67c88c2f30b758d2602dfa7cd929c5749ba29b2f24aa9d5efd0e83040e4ea70a09065936390f6b659362d623a441ac38a58f956004dff6b5992ed3f", 0x62) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000380)={0x0, 0x3c, 0x1, r2}) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x0, 0x2) 18:39:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)}}], 0x1, 0x0, 0x0) [ 1034.240066] EXT4-fs (sda1): Unrecognized mount option "inode_rea%ahead_blks=0x0000000048000000" or missing value [ 1034.359215] EXT4-fs (sda1): Unrecognized mount option "inode_rea%ahead_blks=0x0000000048000000" or missing value 18:39:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}}], 0x4000000000001b7, 0xffffff8d, 0x0) 18:39:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff0000002d}) 18:39:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x5000000fffffff6}}], [], 0x8cffffff00000000}) 18:39:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)}}], 0x1, 0x0, 0x0) 18:39:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_rea,ahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:39:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x20000000000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:39:05 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) r1 = accept(0xffffffffffffffff, &(0x7f0000000240)=@alg, &(0x7f0000000140)=0x80) sendto$inet6(r1, &(0x7f0000000180)="a5be9aa1d4686d10726021f16b731b6ebbb35ddc997e80c92511aa0b3f2042f69e71453930172998", 0x28, 0xc000, &(0x7f0000000200)={0xa, 0x4e21, 0x7, @local, 0x4}, 0x1c) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x8, 0x10100) ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0x80045500, &(0x7f0000000040)) 18:39:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)}}], 0x1, 0x0, 0x0) [ 1035.014529] EXT4-fs (sda1): Unrecognized mount option "inode_rea" or missing value 18:39:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 18:39:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000040)={0x6, 0x8001, {0x0, 0x3, 0x51, {0x0, 0x8}, {0xfffffffffffffffd, 0x100000001}, @cond=[{0x2, 0x0, 0x6, 0x100000001, 0x8, 0x1}, {0x3, 0x7, 0x1, 0x2, 0x8e5, 0x8}]}, {0x56, 0x1, 0x1, {0xfff, 0x1}, {0x1, 0xfffffff800000000}, @cond=[{0x3, 0x6, 0xff2, 0x9, 0xde, 0x67}, {0x6a, 0x8, 0x47, 0xc6, 0x800, 0x1eb44e4c}]}}) fcntl$notify(r0, 0x402, 0x80000000) r1 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r1) 18:39:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) [ 1035.155942] EXT4-fs (sda1): Unrecognized mount option "inode_rea" or missing value 18:39:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000022}}], [], 0x8cffffff00000000}) 18:39:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}}], 0x4000000000001b7, 0x3f00000000000000, 0x0) 18:39:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 18:39:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000000380)=[{{&(0x7f0000000140)=@ax25={{0x3, @bcast}, [@bcast, @bcast, @remote, @rose, @remote, @remote, @default, @rose]}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/151, 0x97}, {&(0x7f0000000280)=""/56, 0x38}], 0x2, &(0x7f0000000300)=""/84, 0x54}, 0x3f}], 0x1, 0x0, &(0x7f00000003c0)={0x0, 0x989680}) 18:39:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_reaiahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:39:06 executing program 1: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) read(r0, &(0x7f0000000000)=""/188, 0xbc) close(r0) 18:39:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x5000000fcfdffff}}], [], 0x8cffffff00000000}) 18:39:06 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) read(r0, &(0x7f0000000000)=""/188, 0xbc) close(r0) pipe(&(0x7f00000000c0)) [ 1035.830457] EXT4-fs (sda1): Unrecognized mount option "inode_reaiahead_blks=0x0000000048000000" or missing value 18:39:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_rea|ahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:39:07 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video35\x00', 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x501000, 0x0) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000140)=0x1ff, &(0x7f0000000180)=0x4) mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:39:07 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x400001000009, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000001c0)={0x3, 0x100000000098f905}) close(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x8000000000a2000, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f00000000c0)={0x1, r1, 0x1}) 18:39:07 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0xaf02, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af25, &(0x7f0000000080)) close(r0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r5, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x1, 0x0, 0x0, 0x7fffffff}]}) 18:39:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x50000006c000000}}], [], 0x8cffffff00000000}) 18:39:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_rea\nahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:39:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}}], 0x4000000000001b7, 0xf0ffffff00000000, 0x0) 18:39:07 executing program 3: mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='\x00', 0x0, 0x10, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000480)=ANY=[]) 18:39:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'Ynode_readahead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:39:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blk.', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:39:07 executing program 0 (fault-call:5 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:39:07 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x8) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x3, 0x0, 0x0, 0x4008000100020, &(0x7f0000000100)=ANY=[@ANYBLOB='inode_readaheap_blks=0xffffffffffffffff,\x00']) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x800, 0x1) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x45000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, r1, 0x9, 0x70bd2b, 0x25dfdbfe, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x800}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000050}, 0x80) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x1, 0xfffffffffffff000, 0x100000000}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000200)={r3, @in={{0x2, 0x4e23, @multicast2}}, 0x2, 0x7dd, 0x10000, 0x3f, 0x11}, 0x98) 18:39:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x200000000000000}}], [], 0x8cffffff00000000}) 18:39:08 executing program 1 (fault-call:5 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1036.952568] FAULT_INJECTION: forcing a failure. [ 1036.952568] name failslab, interval 1, probability 0, space 0, times 0 [ 1036.968169] CPU: 0 PID: 8448 Comm: syz-executor0 Not tainted 4.20.0+ #176 [ 1036.975219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1036.984565] Call Trace: [ 1036.987210] dump_stack+0x1d3/0x2c6 [ 1036.990848] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1036.996054] should_fail.cold.4+0xa/0x17 [ 1037.000133] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1037.005260] ? graph_lock+0x270/0x270 [ 1037.009062] ? __lock_acquire+0x62f/0x4c20 [ 1037.013310] ? mark_held_locks+0x130/0x130 [ 1037.017550] ? find_held_lock+0x36/0x1c0 [ 1037.021610] ? __lock_is_held+0xb5/0x140 [ 1037.025683] ? ___might_sleep+0x1ed/0x300 [ 1037.029831] ? arch_local_save_flags+0x40/0x40 [ 1037.034408] ? print_usage_bug+0xc0/0xc0 [ 1037.038769] ? rcu_read_unlock_special+0x370/0x370 [ 1037.043711] __should_failslab+0x124/0x180 [ 1037.047947] should_failslab+0x9/0x14 [ 1037.051748] __kmalloc+0x2e4/0x760 [ 1037.055299] ? sock_kmalloc+0x15a/0x1f0 [ 1037.059282] sock_kmalloc+0x15a/0x1f0 [ 1037.063098] ? __sk_mem_schedule+0xe0/0xe0 [ 1037.067347] ? trace_hardirqs_on+0xbd/0x310 [ 1037.071668] ? lock_release+0xa00/0xa00 [ 1037.075637] ? lock_sock_nested+0xe2/0x120 [ 1037.079875] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1037.085333] af_alg_alloc_areq+0x83/0x280 [ 1037.089484] ? alg_accept+0x60/0x60 [ 1037.093138] ? __local_bh_enable_ip+0x160/0x260 [ 1037.097813] skcipher_recvmsg+0x350/0x11e0 [ 1037.102064] ? skcipher_bind+0x30/0x30 [ 1037.105971] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1037.111524] ? security_socket_recvmsg+0x9c/0xc0 [ 1037.116284] ? skcipher_bind+0x30/0x30 [ 1037.120179] sock_recvmsg+0xd0/0x110 [ 1037.123893] ? __sock_recv_ts_and_drops+0x420/0x420 [ 1037.128914] ___sys_recvmsg+0x2b6/0x680 [ 1037.132896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1037.138442] ? ___sys_sendmsg+0x930/0x930 [ 1037.142592] ? graph_lock+0x270/0x270 [ 1037.146389] ? lock_release+0xa00/0xa00 [ 1037.150364] ? arch_local_save_flags+0x40/0x40 [ 1037.154961] ? __fget_light+0x2e9/0x430 [ 1037.158951] ? fget_raw+0x20/0x20 [ 1037.162406] ? get_pid_task+0xd6/0x1a0 [ 1037.166297] ? lock_downgrade+0x900/0x900 [ 1037.170448] ? check_preemption_disabled+0x48/0x280 [ 1037.175466] ? find_held_lock+0x36/0x1c0 [ 1037.179648] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1037.185196] do_recvmmsg+0x303/0xb90 [ 1037.188911] ? proc_fail_nth_write+0x9e/0x210 [ 1037.193416] ? ___sys_recvmsg+0x680/0x680 [ 1037.197559] ? find_held_lock+0x36/0x1c0 [ 1037.201626] ? kasan_check_write+0x14/0x20 [ 1037.205871] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1037.210806] ? wait_for_completion+0x8a0/0x8a0 [ 1037.215396] ? __lock_is_held+0xb5/0x140 [ 1037.219466] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1037.225005] ? check_preemption_disabled+0x48/0x280 [ 1037.230040] __sys_recvmmsg+0x259/0x270 [ 1037.234014] ? __ia32_sys_recvmsg+0xb0/0xb0 [ 1037.238331] ? trace_hardirqs_on+0xbd/0x310 [ 1037.242645] ? __ia32_sys_read+0xb0/0xb0 [ 1037.246704] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1037.252069] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1037.257549] __x64_sys_recvmmsg+0xe6/0x140 [ 1037.261802] do_syscall_64+0x1b9/0x820 [ 1037.265690] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1037.271055] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1037.275987] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1037.280829] ? trace_hardirqs_on_caller+0x310/0x310 [ 1037.285852] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1037.290874] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1037.295735] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1037.300925] RIP: 0033:0x457ec9 [ 1037.304117] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1037.323018] RSP: 002b:00007f42a8acbc78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1037.330721] RAX: ffffffffffffffda RBX: 00007f42a8acbc90 RCX: 0000000000457ec9 [ 1037.337981] RDX: 0000000000000001 RSI: 0000000020001700 RDI: 0000000000000004 [ 1037.345248] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1037.352514] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f42a8acc6d4 [ 1037.359778] R13: 00000000004c48be R14: 00000000004d7c98 R15: 0000000000000005 18:39:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_read\nhead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:39:08 executing program 0 (fault-call:5 fault-nth:1): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:39:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}}], 0x4000000000001b7, 0x680e000000000000, 0x0) 18:39:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x1, 0xfffffffffffffda1, 0x0, 0x80000800, &(0x7f0000000100)=ANY=[]) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x30580, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x8) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = socket$inet_udp(0x2, 0x2, 0x0) pwrite64(r1, &(0x7f0000000080)="657a89d7aa31123fb86fd96f5ee0a3367ece3ec054986c681962498ce5bbcbe475dda27c4e9956f0e8efa6337d861d", 0x2f, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x1, 0x0) [ 1037.521683] FAULT_INJECTION: forcing a failure. [ 1037.521683] name failslab, interval 1, probability 0, space 0, times 0 [ 1037.581304] CPU: 0 PID: 8452 Comm: syz-executor1 Not tainted 4.20.0+ #176 [ 1037.588295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1037.597651] Call Trace: [ 1037.600252] dump_stack+0x1d3/0x2c6 [ 1037.603890] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1037.609113] should_fail.cold.4+0xa/0x17 [ 1037.613193] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1037.618323] ? graph_lock+0x270/0x270 [ 1037.622128] ? __lock_acquire+0x62f/0x4c20 [ 1037.626367] ? mark_held_locks+0x130/0x130 [ 1037.630608] ? find_held_lock+0x36/0x1c0 [ 1037.634677] ? __lock_is_held+0xb5/0x140 [ 1037.638753] ? ___might_sleep+0x1ed/0x300 [ 1037.642913] ? arch_local_save_flags+0x40/0x40 [ 1037.647522] ? print_usage_bug+0xc0/0xc0 [ 1037.651589] ? rcu_read_unlock_special+0x370/0x370 [ 1037.656530] __should_failslab+0x124/0x180 [ 1037.660770] should_failslab+0x9/0x14 [ 1037.664568] __kmalloc+0x2e4/0x760 [ 1037.668114] ? sock_kmalloc+0x15a/0x1f0 [ 1037.672096] sock_kmalloc+0x15a/0x1f0 [ 1037.675899] ? __sk_mem_schedule+0xe0/0xe0 [ 1037.680142] ? trace_hardirqs_on+0xbd/0x310 [ 1037.684467] ? lock_release+0xa00/0xa00 [ 1037.688448] ? lock_sock_nested+0xe2/0x120 [ 1037.692689] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1037.698147] af_alg_alloc_areq+0x83/0x280 [ 1037.702295] ? alg_accept+0x60/0x60 [ 1037.705923] ? __local_bh_enable_ip+0x160/0x260 [ 1037.710602] skcipher_recvmsg+0x350/0x11e0 [ 1037.714856] ? skcipher_bind+0x30/0x30 [ 1037.718752] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1037.724298] ? security_socket_recvmsg+0x9c/0xc0 [ 1037.729065] ? skcipher_bind+0x30/0x30 [ 1037.732963] sock_recvmsg+0xd0/0x110 [ 1037.736682] ? __sock_recv_ts_and_drops+0x420/0x420 [ 1037.741706] ___sys_recvmsg+0x2b6/0x680 [ 1037.745685] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1037.751341] ? ___sys_sendmsg+0x930/0x930 [ 1037.755516] ? graph_lock+0x270/0x270 [ 1037.759311] ? lock_release+0xa00/0xa00 [ 1037.763300] ? arch_local_save_flags+0x40/0x40 [ 1037.767891] ? __fget_light+0x2e9/0x430 [ 1037.771870] ? fget_raw+0x20/0x20 [ 1037.775328] ? get_pid_task+0xd6/0x1a0 [ 1037.779215] ? lock_downgrade+0x900/0x900 [ 1037.783363] ? check_preemption_disabled+0x48/0x280 [ 1037.788389] ? find_held_lock+0x36/0x1c0 [ 1037.792455] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1037.798003] do_recvmmsg+0x303/0xb90 [ 1037.801730] ? proc_fail_nth_write+0x9e/0x210 [ 1037.806235] ? ___sys_recvmsg+0x680/0x680 [ 1037.810380] ? find_held_lock+0x36/0x1c0 [ 1037.814450] ? kasan_check_write+0x14/0x20 [ 1037.818685] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1037.823622] ? wait_for_completion+0x8a0/0x8a0 [ 1037.828209] ? __lock_is_held+0xb5/0x140 [ 1037.832277] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1037.837813] ? check_preemption_disabled+0x48/0x280 [ 1037.842851] __sys_recvmmsg+0x259/0x270 [ 1037.846831] ? __ia32_sys_recvmsg+0xb0/0xb0 [ 1037.851153] ? trace_hardirqs_on+0xbd/0x310 [ 1037.855472] ? __ia32_sys_read+0xb0/0xb0 [ 1037.859537] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1037.864911] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1037.870367] __x64_sys_recvmmsg+0xe6/0x140 [ 1037.874629] do_syscall_64+0x1b9/0x820 [ 1037.878521] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1037.883892] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1037.888820] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1037.893666] ? trace_hardirqs_on_caller+0x310/0x310 [ 1037.898687] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1037.903707] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1037.908730] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1037.913587] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1037.918773] RIP: 0033:0x457ec9 [ 1037.921967] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1037.940865] RSP: 002b:00007f3478805c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1037.948575] RAX: ffffffffffffffda RBX: 00007f3478805c90 RCX: 0000000000457ec9 [ 1037.955846] RDX: 0000000000000001 RSI: 0000000020001700 RDI: 0000000000000004 [ 1037.963114] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1037.970393] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f34788066d4 18:39:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1037.977665] R13: 00000000004c48be R14: 00000000004d7c98 R15: 0000000000000005 18:39:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0xffffff8d, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:39:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_read\"head_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:39:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000200)={@generic={0x11, "b67f17f40ab7559afbb738398d5d2fa41792be9fc58454b98152f2116137fa8862ee872bd95c20016678287b50638b53354114d07d4b717bcb7e786b377dc708454f3f6a2dee5e3001f7fb102c839638838cb9895d7dfdd580cdb5a943d25f2bcb5b00f4d196d78b8c6775aa31f4291955274ebd84e5116d2aa26e799b68"}, {&(0x7f0000000140)=""/164, 0xa4}, &(0x7f0000000040), 0x12}, 0xa0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:39:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000f0e}}], [], 0x8cffffff00000000}) 18:39:09 executing program 1 (fault-call:5 fault-nth:1): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:39:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0xfffffff0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1038.331878] FAULT_INJECTION: forcing a failure. [ 1038.331878] name failslab, interval 1, probability 0, space 0, times 0 [ 1038.379829] CPU: 0 PID: 8486 Comm: syz-executor1 Not tainted 4.20.0+ #176 [ 1038.386875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1038.396344] Call Trace: [ 1038.398940] dump_stack+0x1d3/0x2c6 [ 1038.402585] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1038.407780] ? trace_hardirqs_on+0xbd/0x310 [ 1038.412098] ? kasan_check_read+0x11/0x20 [ 1038.416340] ? finish_task_switch+0x1f4/0x910 [ 1038.420858] should_fail.cold.4+0xa/0x17 [ 1038.424936] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1038.430047] ? _raw_spin_unlock_irq+0x60/0x80 [ 1038.434624] ? finish_task_switch+0x1f4/0x910 [ 1038.439119] ? finish_task_switch+0x1b4/0x910 [ 1038.443616] ? __switch_to_asm+0x34/0x70 [ 1038.447677] ? preempt_notifier_register+0x200/0x200 [ 1038.452777] ? __switch_to_asm+0x34/0x70 [ 1038.456861] ? __switch_to_asm+0x34/0x70 [ 1038.460918] ? __switch_to_asm+0x40/0x70 [ 1038.464983] ? graph_lock+0x270/0x270 [ 1038.468778] ? __switch_to_asm+0x40/0x70 [ 1038.472836] ? __switch_to_asm+0x34/0x70 18:39:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0xf0ffffff00000000, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1038.476898] ? print_usage_bug+0xc0/0xc0 [ 1038.480960] ? __switch_to_asm+0x40/0x70 [ 1038.485037] ? find_held_lock+0x36/0x1c0 [ 1038.489123] ? __lock_is_held+0xb5/0x140 [ 1038.493194] ? ___might_sleep+0x1ed/0x300 [ 1038.497343] ? arch_local_save_flags+0x40/0x40 [ 1038.501921] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1038.506502] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1038.511434] __should_failslab+0x124/0x180 [ 1038.515673] should_failslab+0x9/0x14 [ 1038.519471] __kmalloc+0x2e4/0x760 [ 1038.523015] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1038.527765] ? sock_kmalloc+0x15a/0x1f0 [ 1038.531748] sock_kmalloc+0x15a/0x1f0 [ 1038.535549] ? __sk_mem_schedule+0xe0/0xe0 [ 1038.535569] ? skcipher_recvmsg+0x49f/0x11e0 [ 1038.535586] skcipher_recvmsg+0x4fd/0x11e0 [ 1038.535609] ? skcipher_bind+0x30/0x30 [ 1038.552308] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1038.552326] ? security_socket_recvmsg+0x9c/0xc0 [ 1038.552342] ? skcipher_bind+0x30/0x30 [ 1038.566478] sock_recvmsg+0xd0/0x110 [ 1038.570197] ? __sock_recv_ts_and_drops+0x420/0x420 [ 1038.575226] ___sys_recvmsg+0x2b6/0x680 [ 1038.579200] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1038.584747] ? ___sys_sendmsg+0x930/0x930 [ 1038.588894] ? graph_lock+0x270/0x270 [ 1038.592689] ? lock_release+0xa00/0xa00 [ 1038.596659] ? arch_local_save_flags+0x40/0x40 [ 1038.601243] ? __fget_light+0x2e9/0x430 [ 1038.605239] ? fget_raw+0x20/0x20 [ 1038.608702] ? get_pid_task+0xd6/0x1a0 [ 1038.612607] ? lock_downgrade+0x900/0x900 [ 1038.616770] ? check_preemption_disabled+0x48/0x280 [ 1038.621792] ? find_held_lock+0x36/0x1c0 [ 1038.625861] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1038.631410] do_recvmmsg+0x303/0xb90 [ 1038.635126] ? proc_fail_nth_write+0x9e/0x210 [ 1038.639631] ? ___sys_recvmsg+0x680/0x680 [ 1038.643782] ? find_held_lock+0x36/0x1c0 [ 1038.647845] ? kasan_check_write+0x14/0x20 [ 1038.652085] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1038.657023] ? wait_for_completion+0x8a0/0x8a0 [ 1038.661604] ? __lock_is_held+0xb5/0x140 [ 1038.665668] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1038.671206] ? check_preemption_disabled+0x48/0x280 [ 1038.676236] __sys_recvmmsg+0x259/0x270 [ 1038.680213] ? __ia32_sys_recvmsg+0xb0/0xb0 [ 1038.684533] ? trace_hardirqs_on+0xbd/0x310 [ 1038.688868] ? __ia32_sys_read+0xb0/0xb0 [ 1038.692927] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1038.698296] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1038.703752] __x64_sys_recvmmsg+0xe6/0x140 [ 1038.707998] do_syscall_64+0x1b9/0x820 [ 1038.711886] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1038.717255] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1038.722183] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1038.727032] ? trace_hardirqs_on_caller+0x310/0x310 [ 1038.732055] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1038.737075] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1038.742100] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1038.746957] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1038.752143] RIP: 0033:0x457ec9 [ 1038.755336] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 18:39:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}}], 0x4000000000001b7, 0x7000000, 0x0) [ 1038.774747] RSP: 002b:00007f3478805c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1038.782457] RAX: ffffffffffffffda RBX: 00007f3478805c90 RCX: 0000000000457ec9 [ 1038.789837] RDX: 0000000000000001 RSI: 0000000020001700 RDI: 0000000000000004 [ 1038.797104] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1038.804375] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f34788066d4 [ 1038.811643] R13: 00000000004c48be R14: 00000000004d7c98 R15: 0000000000000005 18:39:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x700000000000000, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1038.850517] EXT4-fs: 3 callbacks suppressed [ 1038.850529] EXT4-fs (sda1): Unrecognized mount option "inode_read"head_blks=0x0000000048000000" or missing value 18:39:10 executing program 1 (fault-call:5 fault-nth:2): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:39:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x800000000000000, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:39:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80800) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000140)) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) [ 1039.055072] EXT4-fs (sda1): Unrecognized mount option "inode_read"head_blks=0x0000000048000000" or missing value 18:39:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x7f00000000000000, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:39:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_read%head_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:39:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}, 0x22}], [], 0x8cffffff00000000}) 18:39:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:39:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0xf0ffffff, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:39:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x1000000000000000, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1039.304817] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_blks=0x0500000000000000"" or missing value 18:39:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x700, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1039.465694] EXT4-fs (sda1): Unrecognized mount option "inode_read%head_blks=0x0000000048000000" or missing value 18:39:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}}], 0x4000000000001b7, 0x680e0000, 0x0) 18:39:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x8dffffff, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:39:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}, 0x2d}], [], 0x8cffffff00000000}) 18:39:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x8, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:39:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x3001001, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x8eece0ad6df2de20, &(0x7f0000000200)={[{@metacopy_on='metacopy=on'}, {@default_permissions='default_permissions'}, {@lowerdir={'lowerdir', 0x3d, './file0'}}], [{@euid_lt={'euid<', r0}}, {@measure='measure'}]}) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x290a, 0x0, 0x100020, &(0x7f0000000280)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [{@uid_eq={'uid', 0x3d, r0}}, {@uid_eq={'uid', 0x3d, r0}}, {@dont_appraise='dont_appraise'}, {@smackfshat={'smackfshat', 0x3d, '^'}}], 0x8cffffff00000000}) 18:39:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_read,head_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) [ 1039.808116] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_blks=0x0500000000000000-" or missing value 18:39:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0xf0ffffff, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:39:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x700000000000000, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:39:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffffffffffe6d, 0x0, 0x3200000, &(0x7f0000000100)=ANY=[@ANYBLOB='quoaa,\x00']) [ 1039.929442] EXT4-fs (sda1): Unrecognized mount option "inode_read" or missing value 18:39:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x7, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1039.989918] EXT4-fs (sda1): Unrecognized mount option "inode_readahead_blks=0x0500000000000000-" or missing value 18:39:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x8000000, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:39:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x2001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0xffffffffffffffff}}], [], 0x8cffffff00000000}) 18:39:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}}], 0x4000000000001b7, 0x4000, 0x0) 18:39:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readihead_blks', 0x3d, 0x48000000}}], [], 0x8cffffff00000000}) 18:39:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x500000000000000}}], [], 0x8cffffff00000006}) 18:39:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x10, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:39:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x10000000, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:39:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f00000001c0)={[{@grpjquota='grpjquota='}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2044}}, {@nobarrier='nobarrier'}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x349a}}, {@quota='quota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [], 0x8cffffff00000000}) 18:39:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x10, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:39:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x8000000000000000, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1040.863351] EXT4-fs (sda1): Unrecognized mount option "inode_readihead_blks=0x0000000048000000" or missing value 18:39:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0xf0ffffff00000000, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1041.044424] EXT4-fs (sda1): re-mounted. Opts: grpjquota=,debug_want_extra_isize=0x0000000000002044,nobarrier,debug_want_extra_isize=0x000000000000349a,quota,jqfmt=vfsv0, [ 1041.074127] ================================================================== [ 1041.076615] EXT4-fs (sda1): Unrecognized mount option "inode_readihead_blks=0x0000000048000000" or missing value 18:39:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x8dffffff00000000, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1041.082026] BUG: KASAN: use-after-free in __ext4_expand_extra_isize+0x16f/0x240 [ 1041.082057] Write of size 13434 at addr ffff88804a680ba0 by task syz-executor0/26013 [ 1041.082061] [ 1041.082074] CPU: 0 PID: 26013 Comm: syz-executor0 Not tainted 4.20.0+ #176 [ 1041.082081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1041.082086] Call Trace: [ 1041.082101] dump_stack+0x1d3/0x2c6 [ 1041.082115] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1041.082127] ? printk+0xa7/0xcf [ 1041.082141] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 1041.082170] print_address_description.cold.5+0x9/0x1ff [ 1041.082187] ? __ext4_expand_extra_isize+0x16f/0x240 [ 1041.152759] EXT4-fs error (device sda1): ext4_xattr_set_entry:1602: inode #16487: comm syz-executor1: corrupted xattr entries [ 1041.155610] kasan_report.cold.6+0x1b/0x39 [ 1041.155625] ? __ext4_expand_extra_isize+0x16f/0x240 [ 1041.155643] ? __ext4_expand_extra_isize+0x16f/0x240 [ 1041.155659] check_memory_region+0x13e/0x1b0 [ 1041.186086] memset+0x23/0x40 [ 1041.189205] __ext4_expand_extra_isize+0x16f/0x240 [ 1041.194232] ext4_mark_inode_dirty+0x8f9/0xb20 [ 1041.197201] EXT4-fs error (device sda1): ext4_xattr_set_entry:1602: inode #16487: comm syz-executor1: corrupted xattr entries [ 1041.198817] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1041.198840] ? ext4_expand_extra_isize+0x5b0/0x5b0 [ 1041.198858] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1041.198875] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 1041.198891] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1041.198908] ? inode_init_owner+0x340/0x340 [ 1041.198930] ? current_time+0x10b/0x1b0 [ 1041.198945] ? timespec64_trunc+0x180/0x180 [ 1041.198962] ? kasan_check_write+0x14/0x20 [ 1041.199038] ext4_unlink+0x820/0x1220 [ 1041.240481] EXT4-fs error (device sda1): ext4_xattr_set_entry:1602: inode #16487: comm syz-executor1: corrupted xattr entries [ 1041.240853] ? ext4_rmdir+0xd70/0xd70 [ 1041.272337] ? may_link+0x330/0x420 [ 1041.275970] ? selinux_inode_rename+0x880/0x880 [ 1041.280648] ? down_write+0x8a/0x130 [ 1041.284364] ? selinux_inode_unlink+0x22/0x30 [ 1041.288863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 18:39:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001740)="d053051b041378f1a74dae5a8fa36e9e3d9c77c8e8d677fb8a0122c8e93b9ac531372466ec2b38d01a719239bf883e1b7e036fe5755307671be5505ee3b60d949b45103234e3b6dfb7a4b4c3048601503f0861540e615c283f825443ffa00e2f8e9aea4ac9f7bf3e10481492598a8b5e4aeae2c7c0b0e80cc9cbfbea4a4fa8e9", 0x80}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001700)=[{{0x0, 0x8000000000000000, &(0x7f0000001580)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 1041.294494] vfs_unlink+0x2db/0x510 [ 1041.298125] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1041.303666] do_unlinkat+0x6cc/0xa30 [ 1041.307391] ? __ia32_sys_rmdir+0x40/0x40 [ 1041.311539] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1041.317081] ? strncpy_from_user+0x3be/0x510 [ 1041.321497] ? digsig_verify+0x1530/0x1530 [ 1041.325731] ? kmem_cache_alloc+0x33f/0x730 [ 1041.330079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1041.335616] ? getname_flags+0x26e/0x590 [ 1041.339680] __x64_sys_unlink+0x42/0x50 [ 1041.343653] do_syscall_64+0x1b9/0x820 [ 1041.347543] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1041.352903] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1041.357825] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1041.362669] ? trace_hardirqs_on_caller+0x310/0x310 [ 1041.367776] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1041.372796] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1041.377645] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1041.382836] RIP: 0033:0x457c17 [ 1041.386036] Code: 00 66 90 b8 58 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ed b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1041.404934] RSP: 002b:00007ffc922ae428 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 1041.412638] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457c17 [ 1041.419903] RDX: 00007ffc922ae440 RSI: 00007ffc922ae440 RDI: 00007ffc922ae4d0 [ 1041.427166] RBP: 00000000000009e0 R08: 0000000000000000 R09: 0000000000000010 [ 1041.434433] R10: 000000000000000a R11: 0000000000000246 R12: 00007ffc922af560 [ 1041.441695] R13: 000000000231f940 R14: 0000000000000000 R15: 0000000000000000 [ 1041.448982] [ 1041.450600] The buggy address belongs to the page: [ 1041.455522] page:ffffea000129a000 count:2 mapcount:0 mapping:ffff888219e13ad8 index:0x461 [ 1041.463921] def_blk_aops [ 1041.463931] flags: 0x1fffc000000203a(referenced|dirty|lru|active|private) [ 1041.473603] raw: 01fffc000000203a ffffea0001297188 ffffea0001fbcb08 ffff888219e13ad8 [ 1041.481486] raw: 0000000000000461 ffff888092f2d5e8 00000002ffffffff ffff888057c1adc0 [ 1041.489356] page dumped because: kasan: bad access detected [ 1041.495076] page->mem_cgroup:ffff888057c1adc0 [ 1041.499567] [ 1041.501185] Memory state around the buggy address: [ 1041.506106] ffff88804a681f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1041.513462] ffff88804a681f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1041.520814] >ffff88804a682000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 1041.528160] ^ [ 1041.531520] ffff88804a682080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 1041.538871] ffff88804a682100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 1041.546224] ================================================================== [ 1041.553574] Disabling lock debugging due to kernel taint [ 1041.564854] Kernel panic - not syncing: panic_on_warn set ... [ 1041.570773] CPU: 0 PID: 26013 Comm: syz-executor0 Tainted: G B 4.20.0+ #176 [ 1041.579162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1041.588501] Call Trace: [ 1041.591086] dump_stack+0x1d3/0x2c6 [ 1041.594724] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1041.599913] ? __ext4_expand_extra_isize+0x80/0x240 [ 1041.605020] panic+0x2ad/0x55f [ 1041.608211] ? add_taint.cold.5+0x16/0x16 [ 1041.612369] ? preempt_schedule+0x4d/0x60 [ 1041.616512] ? ___preempt_schedule+0x16/0x18 [ 1041.620913] ? trace_hardirqs_on+0xb4/0x310 [ 1041.625235] ? __ext4_expand_extra_isize+0x16f/0x240 [ 1041.630341] end_report+0x47/0x4f [ 1041.633790] kasan_report.cold.6+0xe/0x39 [ 1041.637934] ? __ext4_expand_extra_isize+0x16f/0x240 [ 1041.643037] ? __ext4_expand_extra_isize+0x16f/0x240 [ 1041.648140] check_memory_region+0x13e/0x1b0 [ 1041.652544] memset+0x23/0x40 [ 1041.655654] __ext4_expand_extra_isize+0x16f/0x240 [ 1041.660584] ext4_mark_inode_dirty+0x8f9/0xb20 [ 1041.665161] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1041.670615] ? ext4_expand_extra_isize+0x5b0/0x5b0 [ 1041.675546] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1041.680672] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 1041.685866] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1041.691401] ? inode_init_owner+0x340/0x340 [ 1041.695727] ? current_time+0x10b/0x1b0 [ 1041.699701] ? timespec64_trunc+0x180/0x180 [ 1041.704019] ? kasan_check_write+0x14/0x20 [ 1041.708252] ext4_unlink+0x820/0x1220 [ 1041.712050] ? ext4_rmdir+0xd70/0xd70 [ 1041.715845] ? may_link+0x330/0x420 [ 1041.719467] ? selinux_inode_rename+0x880/0x880 [ 1041.721824] kobject: 'loop3' (00000000a5885c4f): kobject_uevent_env [ 1041.724133] ? down_write+0x8a/0x130 [ 1041.724148] ? selinux_inode_unlink+0x22/0x30 [ 1041.724164] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 18:39:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000008ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x63) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="b713288a91ce3ffdec16b3", 0xb) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0xfffffffffffffe5c, &(0x7f00000061c0)=[{&(0x7f0000000040)=""/60, 0xfe6e}], 0x1, 0x0, 0xffffff98}}], 0x4000000000001b7, 0x7, 0x0) [ 1041.731877] kobject: 'loop3' (00000000a5885c4f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1041.734246] vfs_unlink+0x2db/0x510 [ 1041.734258] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1041.734273] do_unlinkat+0x6cc/0xa30 [ 1041.766512] ? __ia32_sys_rmdir+0x40/0x40 [ 1041.770654] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1041.776184] ? strncpy_from_user+0x3be/0x510 [ 1041.780591] ? digsig_verify+0x1530/0x1530 [ 1041.784820] ? kmem_cache_alloc+0x33f/0x730 [ 1041.789158] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1041.794703] ? getname_flags+0x26e/0x590 [ 1041.798763] __x64_sys_unlink+0x42/0x50 [ 1041.802738] do_syscall_64+0x1b9/0x820 [ 1041.806620] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1041.811996] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1041.816917] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1041.821754] ? trace_hardirqs_on_caller+0x310/0x310 [ 1041.826769] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1041.831782] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1041.836638] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1041.841821] RIP: 0033:0x457c17 [ 1041.845011] Code: 00 66 90 b8 58 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ed b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1041.863905] RSP: 002b:00007ffc922ae428 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 1041.871605] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457c17 [ 1041.878868] RDX: 00007ffc922ae440 RSI: 00007ffc922ae440 RDI: 00007ffc922ae4d0 [ 1041.886130] RBP: 00000000000009e0 R08: 0000000000000000 R09: 0000000000000010 [ 1041.893394] R10: 000000000000000a R11: 0000000000000246 R12: 00007ffc922af560 [ 1041.900659] R13: 000000000231f940 R14: 0000000000000000 R15: 0000000000000000 [ 1041.909117] Kernel Offset: disabled [ 1041.912740] Rebooting in 86400 seconds..