ffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:32 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:32 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x10420, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f0000000280)=""/195) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x7ff, 0x404d4a8f2443cf0c) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x19, &(0x7f0000000140)={r3}, 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x1f, 0x8, 0xe14, 0x6, r3}, &(0x7f0000000180)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x309, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x4, 0x10040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000240)={0x5, 0x1, 0x7, 0x8, 0x20}, 0x1) ioctl$KVM_SET_SIGNAL_MASK(r4, 0x4004ae8b, &(0x7f0000000000)={0xab, "0e0764a6ae84a88209901b03801ae205c94d8de35a4cf57d78cdd71915fd2b6555d1a5bca23294d72ef857aff81f7363841167dcf3664c3cf9b35b5bcc364f96fdc086f986f504117fee94ef160214e8bcea7576bc38293e634908f9be2c21c9c368d0b69fe2fa1e78b7a1afea5cc50c5fad614e620d6713f131c3882caf2969cf10cdc0aaede4f85c06764c35952f55003d4b9c8b97d7fdac9b87b6f7312f47835aa4957e32b52209d07f"}) rmdir(&(0x7f00000003c0)='./file0\x00') 22:17:33 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80000001, 0x100) write$capi20_data(r0, &(0x7f0000000040)={{0x10, 0x101, 0x0, 0x80, 0xffff, 0x4}, 0x80, "631da132ef8b6f1327d4cdb125c0fb77eaf0df5401a12b32b16818a40e0ab3615bdb7744c29bdb5bef8e5aec1dfe9b104cb6b9343508cbf50fc1eb8ff0c16bfec9bd81042a4bdbc9f6ef98d30cf4b61646ef40bfb499f4100d27a18c66eda08866e63cd412d7e263037a23401adda71296aee97b5763e785141ece5bc694d399"}, 0x92) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:33 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:33 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffd41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x3b400d8e51bab7ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x4, 0x4}, 0x0, 0x0, 0x400, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xde99b0f453f493d0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r0) 22:17:33 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) 22:17:33 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280), 0x0, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:33 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x94, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r0) 22:17:33 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000000)='./file0\x00', 0x1a5) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:33 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(0x0, 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:33 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x4, &(0x7f0000000180)=[{&(0x7f00000005c0)="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", 0x1000, 0xfffffffffffffffd}, {&(0x7f0000000240)="79e8ea6139080b44266ccc0fd1edd945a91fc3c30d51db85fa455f444f84a6c6d0545d5f20557394be7df570b389d7bf5cc1bd19d1b4b4dfb85dbfe5aa30f9743816143e78c06d52b1537a05102e7cdb8500d2ab6626d822fec36ab212446ce23019077cf4dea5f9b7242e14b43754661b89d3789c43d33c86f3e025e75b219e06e2e06134826231558129c99219b20990b3e3d9e063a564c6069b646b5fd97e9fc6e8c7a587dc295753f41a48c49f57e1c09e8d227478acdb3beb2a3a64d3ec8c6be3f71f8230c4ffd1260160c8cbff27748cc19a595e0e5cb53072ddfd4af6f416d1ea2c6c", 0xe6, 0x589b2bd1}, {&(0x7f0000000340)="da987307b3e8fee5ed01105ad5faf4a05213e041580c320db9ce2bd06d6fc46db10c9ab40c82f45deaf9a7a06a930c52f33dcf6b76dee447c30eac1a58134f088245c8f12528750b344dbe452779dd291e712e255ea9ad6fc4d32bfe1970e634b49c1dc95899af9cdcc3ef1b8cbe6f2fb3fb0e4789c974e4dccf556a62d8bdfa4d424c3308a207a27ed8faeb82e5d13fcf2209752339940fe1f5013bb3d14bf4ce04203fd34f0c83c2a6c686e1fd16d428a6c1a8a386a308c988ee3f019d35624512121c9395b39d715c0c15b40c9bb98e2986fcef4ad5525410c5b746fe3ee616a7e0e4974656b2", 0xe8, 0xffff}, {&(0x7f0000000080)="fe98edf89760e8199a1ddb5b44bcd35f6716708f593ead87eb0440c2ba74a5f761f8df71025fd1612838267348a5acf3773ceb5e6b097b513f2b63871683a62a600922c576bb6327c37ef01eef90d04e51c7f84ae95d8412b2ab304dda1853f23292642b880d82bce16b40d7999dda3140146730d7", 0x75, 0x80}], 0x8400, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"]) r0 = socket$inet6(0xa, 0x0, 0x0) accept4(r0, &(0x7f0000001800)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}, &(0x7f0000001880)=0x80, 0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) syz_mount_image$msdos(&(0x7f00000018c0)='msdos\x00', &(0x7f0000001900)='./file0\x00', 0x1, 0x1, &(0x7f0000001980)=[{&(0x7f0000001940)="edd9047804be17478b16bde7fd1da366b003805bc40c4a8098eb59cb1e4c2599bd5404791b76b076ab55531d8ba5a7", 0x2f, 0xfffffffffffffffc}], 0x20, &(0x7f00000019c0)={[{@fat=@allow_utime={'allow_utime', 0x3d, 0x4}}, {@fat=@check_strict='check=strict'}, {@dots='dots'}, {@nodots='nodots'}, {@dots='dots'}, {@dots='dots'}, {@nodots='nodots'}], [{@subj_role={'subj_role', 0x3d, '9p\x00'}}, {@uid_lt={'uid<', r2}}, {@fowner_eq={'fowner', 0x3d, r4}}, {@uid_gt={'uid>', r6}}]}) setuid(r2) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000001700)='9p\x00', 0x2820, &(0x7f0000001740)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@noextend='noextend'}, {@cache_fscache='cache=fscache'}, {@fscache='fscache'}, {@access_client='access=client'}, {@noextend='noextend'}, {@noextend='noextend'}, {@cache_none='cache=none'}], [{@uid_lt={'uid<', r2}}]}}) 22:17:33 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) 22:17:34 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x80) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000080)=0x101, 0x4) syz_open_dev$amidi(0x0, 0x52e, 0x200400) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r1) 22:17:34 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(0x0, 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:34 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280), 0x0, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:34 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000040)={0x0, @reserved}) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:34 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) 22:17:34 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) r0 = syz_open_dev$dri(0x0, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) r4 = accept(r3, &(0x7f0000000000)=@nfc_llcp, &(0x7f0000000080)=0x80) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e21, 0x6, @empty, 0xd36}}, 0xcfe, 0x7fff, 0xffff178c, 0x6, 0x40}, &(0x7f00000000c0)=0x98) r6 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r6, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$EVIOCGBITSW(r6, 0x80404525, &(0x7f0000000300)=""/83) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000001c0)={0x6, 0xc97}, 0xc) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000100)=ANY=[@ANYRES32=r5, @ANYBLOB="000c0500cc07fb8e002a8b070002"], &(0x7f0000000180)=0x12) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x2db, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x6, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:34 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x2, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000080)={0x800}, 0x4) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r0) 22:17:34 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(0x0, 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:34 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280), 0x0, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:34 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:34 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40401, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000040)="04b6235323557747b4cbdaf63d2689986655e4ace9cbde781596350e048e") rmdir(&(0x7f0000000580)='./file0\x00') 22:17:34 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:35 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:35 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1", 0x63, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:35 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:35 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x2, 0x512002) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={'ip6tnl0\x00', {0x2, 0x4e22, @empty}}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r2, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000240)={0x5, 0x1, 0x7, 0x8, 0x20}, 0x1) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000240)={0x6, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}]}) r4 = socket$bt_bnep(0x1f, 0x3, 0x4) connect(r4, &(0x7f0000985ff8)=@rxrpc=@in4={0x21, 0x2, 0x2, 0x0, {0x2, 0x4e23, @local}}, 0xffffffffffffff55) ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x891a, &(0x7f00000000c0)={'lapb0\x00', {0x2, 0x4e22, @multicast2}}) r5 = syz_open_dev$dri(0x0, 0x0, 0x0) r6 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r6, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) ioctl$BLKTRACETEARDOWN(r5, 0x1276, 0x0) r8 = dup(r7) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r5, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r8}) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r8, 0x11b, 0x6, &(0x7f0000000140)=0x10000, 0x4) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x1, 0x0) write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r1) 22:17:35 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:35 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r1, 0x100, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xcf}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000080}, 0x95) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:35 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000240)={0x5, 0x1, 0x7, 0x8, 0x20}, 0x1) ioctl$TIOCGICOUNT(r0, 0x545d, 0x0) 22:17:35 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1", 0x63, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:35 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:36 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7, 0x80) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000080)={0x22d5, 0x6dc, 0x21, 0x1}, 0x10) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) ptrace$peekuser(0x3, r2, 0x7) 22:17:36 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x80000, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000040)="5fd1639fde00ba0395b3cf440fd3bcba5d647d64dedf06b39bbaaddf50ded5697f82a6ee84732fc4ea6c7133d4b7ad2eeeff25219e533b4b2b5340be58a8801e073bc4c5cac2a9605198faa8517d75eac18872971f4888dbb376f60a2ac784bfbdc0d20a6f5fcd3672eb9dd2c7baabd08556349ea08c502f930e24bceb955c8df3a600be6d5cc1e9f82b0b53a2f0813bccb17e864629b7fe40c2f8c8c898722f3bb91c7623e4312d6e3b1dee8b9fa676e3445571fc9141ba90", &(0x7f0000000240)=""/160}, 0x20) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:36 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:36 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:36 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:36 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1", 0x63, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:36 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x2, 0x0) r0 = syz_open_dev$dri(0x0, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) r4 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r4, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r4, 0xc01064b5, &(0x7f0000000180)={0x0, 0xfffffffffffffecb}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x1, 0x4, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x100000001, 0x4}, 0x2001, 0x400080000000000, 0x0, 0x2, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r5 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r5, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r5) 22:17:36 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0xb) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r1, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) bind$unix(r1, &(0x7f0000000180)=@file={0x2, './file0\x00'}, 0x6e) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7f, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) utimes(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x77359400}}) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:36 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x4, 0x0, 0x3, 0x1}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000080)={0xae, r1, 0x0, 0x2}) r2 = socket$l2tp(0x18, 0x1, 0x1) write$binfmt_misc(r2, &(0x7f00000002c0)={'syz0', "a5ceb0077ddbe52aadea6df89f3f4b51e87919a7a2c67f62fe8cf2dd13beb123c2833c308f134ac712541e75a593fd4afa4d56f5ed02c3c1873a4279c46cef4e765e143800fbb6b89bdf88beac16d35c97d831ee65c241b6e80aee81b10253046ed47c8a1c3ec9769b66ebf9d9d14b4a4bcae9fbc3abc9ba827caf998031cfabebe5905f6945fc820c15ee3e4e77ad10c4a19c567c5e8f4c780bf0dfb5c227c6df10eda1530d21ca4ff22483d1017c48a203722a"}, 0xb8) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:37 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:37 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:37 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2", 0x94, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:37 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r1 = getpgid(0xffffffffffffffff) r2 = syz_open_dev$dri(0x0, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r5 = dup(r4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r5}) write$P9_RWSTAT(r5, &(0x7f0000000040)={0x7, 0x7f, 0x2}, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) r7 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r7, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) write$P9_RAUTH(r7, &(0x7f0000000140)={0x14, 0x67, 0x2, {0x0, 0x2, 0x4}}, 0x14) write$vhci(r6, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r6) write$P9_RMKDIR(r0, &(0x7f00000001c0)={0x14, 0x49, 0x1, {0x0, 0x4, 0x1}}, 0x14) 22:17:37 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:37 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2", 0x94, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:37 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:37 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000880)=""/4096) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$kcm(r2, &(0x7f0000000840)={&(0x7f0000000040)=@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x80, &(0x7f0000000480)=[{&(0x7f00000001c0)="7c57caf79f42348f03a831e04bc3423db0ea4a09a03468256c3dd3abb53a6f882247de72f7dba9f0aa4ed0de25f65071d8c3d0c3869d263139c1521c72947a2dde5d", 0x42}, {&(0x7f00000000c0)}, {&(0x7f0000000240)="423504136931f9ea73830482b90df950b15e7ec1f8ec35ed7b2726df23e86b01a11c8cdd8da20af72cd890bdc637d409a40cfcc80bea840e6ce0d310aaceff0929363c878f99ff6dfa3115325c5c1a1849733c717e9a38ebbb8caab585f6faf4d1d863430c9be7c1453b357ea273e9d925fea02ac09f4ab8552dfd2a6ea6d78d7dca6ddde27d93d63729357c6001e2fcc1fe", 0x92}, {&(0x7f0000000300)="7d515f1c52c7a71459376c8482cf0404eb9f2ada08246d987841fa1e72ec024629e57dcb08215da7a85d346d88c4bd047964898bee6ac42aac26fe4850b87997519e474768a6e53a825a7b638188ab613c36a7966961afe1504be0950a4ac58f60821888e90442a6243e12b44974f9162068424befc65a12ceb3c531b107ad2256909250d123d731c7ccc4da42cf1f2d602c384071b14fd7f520c5d0da6c03b2d08b1c24da2a56e71b7269ac603d18b2e5a8ff706092eef71f80bcbfc9666f0681d91bc5d4bb61570562d0d056c7e9128a5a4f5818244d93d69c00d594c72c583db62c54812caf12675d5d8722", 0xed}, {&(0x7f0000000400)="071cddb8277a3a83edc4a3f6fc98ed2fa330da80edfb04788251595357593f9227e57f597aea14146b44bcaf0465fcbbe6a3da63a9dfd6a614684a0b94eaef6a3435622e62971d7efd963587b7370ae72c86418a9152c1f6137617", 0x5b}, {&(0x7f0000000140)}], 0x6, &(0x7f0000000500)=[{0x48, 0x101, 0x9, "6cb8505bb0ce69d2530b43291fc8848b0f53508795e267c3096b7c1dc89ec437afddf3680e6663e59a15e6669c475db76e6391"}, {0x100, 0x116, 0x7d, "3802aded855a9ce94f801fe4a92b81e5ca14a1b991fa034264e0f59db0f30d4cab2bfe7db0ac2d13865cd22d92894db1c3f2c3ddd0a1ff6c4d9fca57746e5056142f4e18bfd64877d6767ef74735ffd83e1d627255cf6234e305e53ff3e6e771026984ea2cb1e01588bd8b38240883f7edda328328862e112a0c95205760939b9bcc8fc8d7dacb12a10c042f700a0e5f169413477298a3a8e8159827824a90ed8d48acbeaa8eb5ed8b8f2c8d05c3558a1300f4941a887b03bd6bc00eb2c3d81038156ea77fa18c4b0dacf5bef988325e06b63bbc55464ff843db7779dca160c2a2fdfc5597b17a6033cb2bc9"}, {0xf8, 0x100, 0x7, "72f0efd304da1112c345a50826dc28a40eacdba92380144666144fb98a584ec1904480b8e1cfc6fa76617ad55e6749f17c1bca4de53843d5322001f49ff794d1146f5e75232c40613d12e375fa70ff263192bc1ec2a2883c3b153056ff6e45200281b84827cecf3d56c4a918896524255a7f59bd303c260e59511d63a79c9d115ae085e94f7a2f43893fb6b741a18aa96049d6ffc7f6775cc3636cf19479db61351a6bb93052c347a60f35ab5c40a0af4fcffd6a42483aeaa8ed75b06a741ab1aa92a6b2096610f287f9811099e1c3beb85683ab66c486351531638f6fae3aa687"}, {0x88, 0xf24baa0a4c8cf88f, 0x80000001, "3bea295bedbb4e20f009abce36e7ebc0cce7dc8e96634848225b5b59e9f87f822568b37b8025c6d12589da7704994a17149569daf28e527b06c89a80080ae5091c2b63978cfb0aee8e7e0171ce26e5fc2b59402536ca0200e19a6ad0dfe80705fb34f90a745c8ac988bef48146074de164ba720e57f885ae"}, {0x18, 0x104, 0x66, "d7"}, {0x38, 0x10a, 0x3ff, "67be604e5be02f345b047c1be05849cb24e13d5817e2037cf54d32799411438a15ade8a1563c65c8"}], 0x318}, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x400043, 0x0) getsockname$inet(r3, &(0x7f0000001880)={0x2, 0x0, @broadcast}, &(0x7f00000018c0)=0x10) write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r1) r4 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r4, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) ioctl$FITRIM(r4, 0xc0185879, &(0x7f0000001900)={0x2, 0xfde4, 0xffffffff}) 22:17:37 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) r0 = syz_open_dev$dri(0x0, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r5, 0xaf01, 0x0) r6 = dup(r5) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) r8 = dup(r7) ioctl$VHOST_SET_VRING_ERR(r6, 0x4008af21, &(0x7f0000000340)={0x0, r8}) ioctl$KDGKBTYPE(r8, 0x4b33, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x19, &(0x7f0000000140)={r9}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000080)={r9, 0x9}, &(0x7f00000000c0)=0x8) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') r10 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f0000000240)={0x5, 0x1, 0x7, 0x8, 0x20}, 0x1) ioctl$DRM_IOCTL_GET_STATS(r10, 0x80f86406, &(0x7f0000000180)=""/79) r11 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200002, 0x0) ioctl$CAPI_GET_ERRCODE(r11, 0x80024321, &(0x7f0000000040)) 22:17:38 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:38 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2", 0x94, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:38 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x220000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r7}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x4001, r4}]]}}}]}, 0x38}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in=@initdev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@initdev}}, &(0x7f0000000a40)=0xe8) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r12 = socket$netlink(0x10, 0x3, 0x0) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r12, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r14}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r14}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r14}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x4001, r11}]]}}}]}, 0x38}}, 0x0) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r16, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r18 = socket$netlink(0x10, 0x3, 0x0) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r18, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r20}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r20}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r20}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x4001, r17}]]}}}]}, 0x38}}, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@ipv4={[], [], @local}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000d00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000dc0)={@empty, @local, 0x0}, &(0x7f0000000e00)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000001040)={'syzkaller0\x00', 0x0}) r25 = socket$netlink(0x10, 0x3, 0x0) r26 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r26, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r26, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r28 = socket$netlink(0x10, 0x3, 0x0) r29 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r29, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x20000000) getsockname$packet(r29, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r28, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r30}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r30}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r25, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r30}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x4001, r27}]]}}}]}, 0x38}}, 0x0) r31 = socket$netlink(0x10, 0x3, 0x0) r32 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r32, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r32, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r34 = socket$netlink(0x10, 0x3, 0x0) r35 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r35, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r35, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r34, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r36}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r36}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r31, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r36}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x4001, r33}]]}}}]}, 0x38}}, 0x0) r37 = syz_open_dev$dri(0x0, 0x0, 0x0) r38 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r38, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r40 = dup(r39) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r37, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r40}) getsockopt$inet_IP_XFRM_POLICY(r40, 0x0, 0x11, &(0x7f0000001080)={{{@in6=@ipv4={[], [], @empty}, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000001180)=0xe8) r42 = socket$netlink(0x10, 0x3, 0x0) r43 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r43, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r43, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r45 = socket$netlink(0x10, 0x3, 0x0) r46 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r46, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r46, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r45, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r47}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r47}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r47}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x4001, r44}]]}}}]}, 0x38}}, 0x0) r48 = syz_open_dev$dri(0x0, 0x0, 0x0) r49 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r49, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r51 = dup(r50) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r48, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r51}) ioctl$sock_SIOCGIFINDEX(r51, 0x8933, &(0x7f00000011c0)={'hwsim0\x00', 0x0}) r53 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r53, 0x29, 0xca, &(0x7f0000000240)={0x5, 0x1, 0x7, 0x8, 0x20}, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r53, 0x29, 0x23, &(0x7f0000001280)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000001380)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001400)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001980)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001940)={&(0x7f0000001440)={0x4ec, r1, 0xc3492e29c20f82e8, 0x70bd2c, 0x25dfdbfb, {}, [{{0x8, 0x1, r7}, {0x4}}, {{0x8, 0x1, r8}, {0x168, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x20}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r20}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r21}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r23}, {0x254, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x80}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r24}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r30}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x9d8a, 0xfc, 0x5, 0x64c}, {0x1, 0x8, 0x24, 0x1}, {0xf960, 0x40, 0x79, 0x80000000}, {0x800, 0x2, 0x2e, 0x32d}, {0x200, 0x9, 0x0, 0x8}, {0x7f, 0x9, 0x1f, 0x9727}, {0x3973, 0x21, 0x1, 0x6}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r33}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r41}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r44}}}]}}, {{0x8, 0x1, r52}, {0xb4, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r54}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r55}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x100}}}]}}]}, 0x4ec}, 0x1, 0x0, 0x0, 0x80}, 0x80) 22:17:38 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:38 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r1, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x6, 0x5e, 0x7}) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x1000, 0x1}) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000003c0)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c008105e00f80ecdb4cb9f207c804a01c000000d0030600030002000a0ada1b16d805000500c50083b8", 0x2e}], 0x1}, 0x0) close(r0) 22:17:38 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) accept4$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14, 0x80800) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x1d, r1}, 0x10, &(0x7f0000000300)={&(0x7f0000000280)={0xf6eaf6fa45f11151, 0x4, 0x9, {0x77359400}, {0x77359400}, {0x4, 0x0, 0x1, 0x1}, 0x1, @can={{0x2, 0x0, 0x0, 0x1}, 0x2, 0x3, 0x0, 0x0, "a63934d17e02395d"}}, 0x48}, 0x1, 0x0, 0x0, 0x60060814}, 0x90000) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:38 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:38 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063", 0xad, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:38 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, 0x0, 0x0) [ 933.291932][ T2352] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.2'. 22:17:38 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) write$ppp(r0, &(0x7f0000000000)="9ad7ef87a7c3f9f20b18e8bc3b6ccc4fa4368f66901ef943bee49a7ce38285c7237a16fc6629829ad8c7b5899ef375c2e6990fdafd8a119582163f03a2bbdb255d6a139bfa68becdc730472f9cf687dca19b14b7392101bce1bdc72ec74972120124af0be6744669ec6eeed2", 0x6c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:38 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:39 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, 0x0, 0x0) 22:17:39 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063", 0xad, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 933.811491][ T2352] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.2'. 22:17:39 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0xfa) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f00000000c0)=r0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x5, 0x1, 0x7, 0x8, 0x20}, 0x1) socket$inet6_sctp(0xa, 0xa, 0x84) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000fee000/0x11000)=nil, 0x11000}, 0x2}) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f0000001380)={0x7, 0x3, 0x0, 0x5d, &(0x7f00000002c0)=""/93, 0x21, &(0x7f0000000340)=""/33, 0x1000, &(0x7f0000000380)=""/4096}) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r3, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r3) 22:17:39 executing program 1: unshare(0x20020000) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x2) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000000)={0x0, @bt={0x9, 0x1, 0x0, 0x1, 0x7, 0x3ef5, 0xfffffff8, 0x7, 0x6, 0x6, 0x4, 0xb408, 0x5, 0xfffffe00, 0x0, 0x20}}) setxattr$security_selinux(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:tmpfs_t:s0\x00', 0x1d, 0x756f18e5dc4c9c14) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x6, 0x0, 0x1, 0x8, 0x0, 0x80000000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4, 0x4, 0xc2764077332e7234, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1, &(0x7f00000000c0)={@remote}, &(0x7f0000000100)=0x14) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:39 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:39 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) fstat(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r0, &(0x7f0000000040)='./file0\x00', r2, r3, 0x8dddccebca767019) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:39 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, 0x0, 0x0) 22:17:39 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063", 0xad, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:39 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f00000001c0)={&(0x7f0000000080)=[0x6, 0x8, 0x7fb9], 0x3, 0x1, 0xb7fe, 0x1, 0xffffffff, 0x7fff, {0x3f, 0x1, 0x0, 0x3, 0x800, 0x8000, 0x4, 0x6213, 0x2, 0x9, 0x80, 0xd9a2, 0xffff, 0xff, "f3ae6cc4db4f3677d927c8456acdbfcbd1ba5ef1a630a470127ef516c9463abc"}}) close(r0) 22:17:40 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:40 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000240)={0xfffffffe, 0x3ff, 0xd0cd, 'queue0\x00', 0x47}) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x1) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:40 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x19, &(0x7f0000000140)={r2}, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000000)={r2, 0x1ff}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000080)={r3, 0x8}, &(0x7f00000000c0)=0x8) 22:17:40 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:40 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df54", 0xb9, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:40 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:40 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$dri(0x0, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) syz_open_dev$video4linux(&(0x7f0000000200)='/dev/v4l-subdev#\x00', 0x5, 0x10000) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r3, 0x0, 0x6, &(0x7f00000000c0)='---[.\x00'}, 0x30) fremovexattr(r4, &(0x7f00000001c0)=@known='user.syz\x00') syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000040)={{0x9, 0xdc}, 0x3, 0x934, 0x8, {0x6, 0xca}, 0x3, 0x101}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r5, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r5) 22:17:40 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000280)=""/191) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) unlink(&(0x7f0000000240)='./file0\x00') r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40040, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84000880}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x64, r2, 0x20, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x80000}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x300000}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7ff}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8000}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000}, 0x40800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:40 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002700), &(0x7f0000002740)=0xfffffffffffffee1) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) getpid() openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000002840)) r4 = syz_open_procfs(0x0, &(0x7f0000002900)='net/if_inet6\x00') sendfile(r2, r4, 0x0, 0x7ffff000) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x1, &(0x7f00000001c0)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r5 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x7ffff000) ioctl$KVM_SET_XSAVE(r4, 0x5000aea5, &(0x7f0000000280)={"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"}) r6 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r6, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) dup2(0xffffffffffffffff, r6) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000003c0)=0xd) socketpair$unix(0x1, 0x5, 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:40 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') pipe(0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:40 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:41 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget(0x2, 0x202) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r0) 22:17:41 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df54", 0xb9, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:41 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) mlockall(0x1) syz_read_part_table(0x6, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000100)="27e5ae076898d23f6ce5c3975d62c2677eb0df9ca51ae067f02bf79da42d053761c97d553471f009d7cba9f70be499d789f91f2f400d6a27e2a6341b639c668d12c1529bfd7e2896ffdb6e29ccc64035ddc20e9d9d25e1489cb612f5b0a09bcf9977210cfb9de3e51b1a990b985853c8a8e7f1c21bf65c8b3d258244cc64a372af7365af0efb7f0c3df84bb8a17e", 0x8e}, {&(0x7f00000001c0)="b28c2033a538edfe9233a31f91973b645fe23cfc0ea8a6eb", 0x18, 0x8}, {&(0x7f0000000200)="aa554145764013575a80a9582d7f3521b3604bd0fe8f393454826590ce76527d927f517a5628a80070757a368150dd9f839732d58070268a5555ce022aedb584ff5bf05f40ab2884bea2cd1d61fe51631cf050a4858a06c57247cc5806a0d937f6105fd527e6572601e5a006b08c6b5b79e5ddcfebf51ed435a4d6d20b83cd1c51f630c896968b3d292dd733de735896504aaabe2c8949a77d65b72621", 0x9d, 0x5}, {&(0x7f00000002c0)="6c592094938adb045915b8419fe7b08e279d54916b0da1359f5be20bb947c53bcec855d6bbf5e4f38acee587742bc76d48a64825b7433a", 0x37, 0x1}, {0x0, 0x0, 0x4}]) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r2, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000300), &(0x7f0000000340)=0x14) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f00000000c0)={0x1}) lremovexattr(0x0, 0x0) pipe(0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x208000, 0x0) connect$vsock_stream(r3, &(0x7f0000000040)={0x28, 0x0, 0x1388, @host}, 0x10) socket$kcm(0x29, 0x7, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:41 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:41 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') pipe(0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:41 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r0) 22:17:41 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000000)) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:41 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df54", 0xb9, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:41 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240), 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:41 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') pipe(0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:42 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b", 0xbf, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:42 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000240)={0x5, 0x1, 0x7, 0x8, 0x20}, 0x1) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f00000001c0)={&(0x7f0000fec000/0x11000)=nil, 0x11000}) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r3 = syz_open_dev$dri(0x0, 0x0, 0x0) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r4, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) r5 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r6 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000240)={0x5, 0x1, 0x7, 0x8, 0x20}, 0x1) sendmsg$nl_generic(r6, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40010000}, 0xc, &(0x7f0000000340)={&(0x7f0000000600)={0x270, 0x28, 0x400, 0x70bd27, 0x25dfdbfb, {0x1d}, [@generic="30db832a9050fdca96205cea4e20a58f70491a9aa62f20249e19a9b2595f4c401ad2cca770bd3b74304215c3f6b7bb9ff764b2b0d84ee857ed42833edd555430a87e187c5dc3cd6e6a026f1e43ddd5d68c52226b5caf17f398e5b93d00fd7ae336d56fa011ebea004bdb4cdcfd864cfe93a7deb55f464cdf52bff17cc8279f551d178863a14a39146e2f0a975e63a5cc8bc09de36016a1a4ffdd8e62352b1b8435540852b53206070c2ffa8fb86f5650b2f0324e5590f8ce593a", @nested={0x1a0, 0x5a, [@generic="96f6ae5205e686fa99e83c957262fe776840f6e0d2348f1aa253d1694c08b3cd1c4745e8359ff83e35bc7c0d2efcb25361ba18d293e98f747812bff375668c2acd026ed5aa589dbd3bf36a60a02c75cccb12ce3db0e997f7a1a8fbaa0cbf0d756416b22597361a60e65aa2f48da06c", @generic="6dc241305ad125412344c45d96e91dc4a73114b3ac049f35fab7bdd7d6df4507114da5a54b1e3da03af83f870787dfce447574dbc7b4db50292c1bbc2359c6d5e3f6b757fdfb782f4c1bf6cac9aca325971a1cd6dc7c6d962bf242a70c1145f0eda2cbdecb4daa991ebf075466febe992781494e67e4cb8834ad813cf7dccf580ade258767a15bcb3f28e21d7d58d31ece512c170a65682f190a01d03fdaebffb6e11c145bf01caeb1a6db7d21c3faad37c9e41cc7b63ab2c1046db9d9a024", @typed={0xc, 0x76, @u64=0x2}, @typed={0x8, 0x34, @u32=0x33}, @generic="331991c90b458082002e4d71cf27cb0386c3b68aeeab2927bad5c97e9cf7ff98c21be57c2ee01969bb968fd5b6eea8344e24bf008b22f41706a2c58fe422fbc1978a47652f5a5266347bb825480dd5a0756563fb9c", @typed={0x4, 0x59}]}]}, 0x270}, 0x1, 0x0, 0x0, 0x8000}, 0xd29842d16677ecdd) ioctl$ION_IOC_ALLOC(r5, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f00000000c0)) ioctl$CAPI_NCCI_GETUNIT(0xffffffffffffffff, 0x80044327, &(0x7f0000000040)=0xe0) close(r1) 22:17:42 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(0xffffffffffffffff, 0x9204, 0x9c0be) pipe(0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:42 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240), 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:43 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20110, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x5) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:43 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r1, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000040)=0x20, &(0x7f0000000080)=0x1) prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x7) socket$inet_udp(0x2, 0x2, 0x0) close(r0) write$sndseq(0xffffffffffffffff, &(0x7f00000001c0)=[{0x9, 0x0, 0x20, 0x1, @tick=0x401, {0xcf, 0xff}, {0x6, 0x8}, @time=@time={0x77359400}}, {0xf, 0x20, 0x3, 0x32, @tick=0x4, {0x20, 0x62}, {0x5, 0x8}, @connect={{0x9}, {0xff, 0x3f}}}], 0x60) 22:17:43 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b", 0xbf, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:43 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(0xffffffffffffffff, 0x9204, 0x9c0be) pipe(0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:43 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240), 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:43 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(0xffffffffffffffff, 0x9204, 0x9c0be) pipe(0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:43 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b", 0xbf, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:43 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0], 0x2}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:43 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r3 = syz_open_dev$dri(0x0, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r6 = dup(r5) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r6}) ioctl$DRM_IOCTL_RM_MAP(r3, 0x4028641b, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x5, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x5}) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x19, &(0x7f0000000140)={r2}, 0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000001c0)={r2, 0x3}, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r7, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r7) r8 = syz_open_dev$dri(0x0, 0x0, 0x0) r9 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r9, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r11 = dup(r10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r8, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r11}) ioctl$USBDEVFS_RESETEP(r11, 0x80045503, &(0x7f0000000040)={0x6, 0x1}) 22:17:43 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) r0 = syz_open_dev$dri(0x0, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) ioctl$KDSETLED(r3, 0x4b32, 0x6) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:43 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:44 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790", 0xc2, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:44 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_open_dev$dri(0x0, 0x0, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x600000, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r4 = dup(r3) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r4}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) close(0xffffffffffffffff) 22:17:44 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0], 0x2}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:44 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-monitor\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000740), &(0x7f0000000780)=0x4) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0xffffffffffffff9a, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r7}]]}}}]}, 0x38}}, 0x0) r8 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r8, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) execveat(r8, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000280)='vti\x00', &(0x7f00000002c0)='/selinux/avc/cache_threshold\x00', &(0x7f0000000300)='posix_acl_accessusermd5sum-eth1mime_typeð0*}@\x00', &(0x7f0000000380)='sit\x00'], &(0x7f00000006c0)=[&(0x7f00000005c0)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', &(0x7f0000000440)='vboxnet0nodevf#cgroup.\\\x00'], 0x1000) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x4001, r4}]]}}}]}, 0x38}}, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={@initdev={0xfe, 0x88, [], 0x4c, 0x0}, @remote, @dev={0xfe, 0x80, [], 0x17}, 0x200, 0x7cf7, 0x2, 0x500, 0x4, 0x10, r7}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 22:17:44 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:44 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790", 0xc2, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:44 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0], 0x2}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:44 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x103, 0x20000) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r0) 22:17:44 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:44 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790", 0xc2, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:45 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x8000000003, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) close(r0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'veth0_to_bond\x00'}) io_setup(0x7, &(0x7f0000000280)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000040), 0xfdef}]) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000680)={0x549, 0x81, 0x6}) ioctl$CAPI_REGISTER(r2, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) io_submit(r1, 0x2, &(0x7f0000000600)=[&(0x7f0000000480)={0x0, 0x0, 0x0, 0xa, 0x100, 0xffffffffffffffff, &(0x7f00000003c0)="43ca1e353850ef3393e1f0d3edc10472bdb2209eac08a89b524f50a54e68cabb638336c8cf378faa8459d8be256af151561dd1f47d98b607b512e944d3bae5ebce14a8419560c41ae0bf6d76858f5168a4c92fab97458f801636f3813a9525bb974da706d42c3ba97eae334f75607a6b8d30d14a9e623c35456259e836e7bc2286844e4343", 0x85, 0x40}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x8, 0x6, r2, &(0x7f00000004c0)="eabf47260022ef5ba42ba16d2dec16d19ac9554837088e014f7dcba9f33108f90c2255964ee6828848a2e42c2cabed5fc3407c32b51fc342aa4bf7dbe91e8336783ecd5d12f671b5c71ac87730750675ab9b11a92d0f4e719c9dfa73aa8d5df6272d6009e1dd7d8f9c31697e3ff044b6e4402698d7040af18a4b0071d98b2ad619b13f00ba8ef020f77da1ef8abb4d67b7a15ce288b30665eb7dc4a1bfb9ff028f6fff44a7989acadcc0dcf48cec4d2f6f5667de9981f9befbf123735b335e067b1c05400c6b99fd980e429c21b63ad2c1541a3b78cf9ab86464d79c3a", 0xdd, 0xfffffffffffffe00, 0x0, 0x1}]) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r3, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r3) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) sendfile(0xffffffffffffffff, r6, &(0x7f0000000640)=0xfffffffffffffff7, 0x9) sendmsg$inet_sctp(r4, &(0x7f0000000140)={&(0x7f0000000080)=@in6={0xa, 0x4e21, 0xffffffff, @mcast1, 0x9d}, 0x1c, &(0x7f00000000c0)=[{&(0x7f00000001c0)="c1d903d50277e4bfbd566a23c4b0073ebfcb1a7db71f7e5bf2d5847aa9935ed2462c6423b4713a3d10a4d705a173504fbb750c74e870dab8b1b1ee4bb413892c37624996b5e74a1d90392360c907976ba3445c4c6d72d6710aebc122f430a1689ffc05d34554e82e861b65f7d1a869ab0ea7804147717b9ff9fea9fad156286410a1795678f35d119fe71a2e6ad0a7d22c192cde36b4ab4a929b0abb8692fa084b05ecc23a1e8aa83c3a93ae1fcfe47760ef403886218ea2cade8fac3ff497d1820ebda3b6468e0f7c7a", 0xca}], 0x1, &(0x7f00000002c0)=[@init={0x18, 0x84, 0x0, {0x3f, 0x1, 0x200, 0x6}}, @dstaddrv6={0x20, 0x84, 0x8, @remote}, @prinfo={0x18, 0x84, 0x5, {0x20, 0x5}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @dstaddrv6={0xff2a, 0x84, 0x8, @loopback}, @init={0x30, 0x84, 0x0, {0x4, 0x86fa, 0x5, 0x4a93}}, @dstaddrv4={0x18, 0x84, 0x7, @local}, @authinfo={0x18, 0x84, 0x6, {0x1}}], 0xd0, 0xc004}, 0x20880) 22:17:45 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:45 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x9c0be) pipe(0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:45 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000000080)={0x5902, 0x7683b038, 0xa9, 0x2, 0x3}) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r1, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f00000000c0)={0xffff, 0x7, 0x2, 0x0, 0xd75, 0x200}) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x4400) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f0000000280)={0x0, 0x0, [], @bt={0x5, 0x3f, 0x1, 0x6, 0x2, 0x9, 0x1, 0x4}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0xffffffff, 0x0, 0x0, 0x80000}, 0x0, 0xb, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000240)={0x5, 0x1, 0x7, 0x8, 0x20}, 0x1) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x10}) 22:17:45 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:45 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d897", 0xc4, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:45 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x9c0be) pipe(0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:46 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000240)={0x5, 0x1, 0x7, 0x8, 0x20}, 0x1) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000000)={'ip6gretap0\x00', 0x1ff}) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @loopback}, &(0x7f00000001c0)=0x10, 0x80000) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000100), &(0x7f0000000180)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:46 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:46 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d897", 0xc4, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:46 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x9c0be) pipe(0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:46 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x20000, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000040)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x6}}, 0x10) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) ioctl$USBDEVFS_GETDRIVER(r2, 0x41045508, &(0x7f0000000240)={0x95be, "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"}) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:46 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:46 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d897", 0xc4, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:47 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:47 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:47 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:47 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={@local, 0x3f}) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)=0x200, 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x4000, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2200}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x0, 0x100, 0x70bd25, 0x25dfdbfb, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x6d8cf5dd0ee9e7f}, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x482, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000240), 0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x150f}, 0x0, 0x9, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') r2 = semget$private(0x0, 0x2000000010a, 0x0) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000000)=""/141) semctl$IPC_RMID(r2, 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0xcf6d, 0x1b0140) 22:17:47 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4195}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r1) r2 = syz_open_dev$dri(0x0, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r5 = dup(r4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r5}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000040)={0x0, 0x8002, 0x8001, 0x5, 0x0}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000340)={r6, 0x59, "abc477f9b077435633d9c8f237dd48f90209ba7b88b5aa42694446ef0486268456ea6fa93f0ad1536726d79c053ed080fd0d2fc6d6d429f1aeb1876d67eb62b9cc7f8a24cd191726108c57eef90bb62afedf5e1489f31c2e48"}, &(0x7f00000000c0)=0x61) r7 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r7, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) r8 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r8, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000540)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x44, r11, 0x326, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@remote}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}]}, 0x44}}, 0x900) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r9, 0x84, 0x19, &(0x7f0000000140)={r10}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r8, 0x84, 0x23, &(0x7f0000000140)={r10, 0xcf6}, 0x8) sendto$inet6(r7, &(0x7f00000001c0)="ab2d5dd9c7525c5b38793e7f600dcc5a46c6f081bb8b0d27e450a4acff0e84a1d65f090d5e00d51554d921925e06e8920044d4f415b821db306ba9b36cc10f554ba3c90d1c8ca5344467d6732a949421700ff9d4334059bffd0dfebb022df5ac9a3aeb3ecd428615c2216299725b28fa8a3ad41395a30409e7934959bab4859492883ce1cb49de4dc2a4ca8ce975ee7cc94e66413f3a7d1ad27ff9f39d291d5fb91cf11de4039e7e14ae44846c29d55598af77f2328f99d6239ce550bb09a324dd92504eb949bf6f42cbdafaa18ffb40fda051bdc64e63162210ad8c8e7d785cd4c26ae050301f701a8025e298", 0xed, 0x40, 0x0, 0x0) 22:17:47 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:47 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r0, 0x4004ae8b, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"/4100]) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:47 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:47 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:47 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(0x0, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000280)={0x2c, 0x0, &(0x7f0000000140)=[@increfs={0x40046304, 0x1}, @increfs={0x40046304, 0x3}, @dead_binder_done, @decrefs={0x40046307, 0x2}, @release={0x40046306, 0x2}], 0xa6, 0x0, &(0x7f00000001c0)="6372f1b1420af6a6ee853f4fd92765893ae3bd6bf8d18c17743fddd1558274c52030a375fd85224d15ef0891f178db9d015e44e174462b492f042eee657854ad641a47b6f6657737d88c83960ee9648aa265eb75a1faa437d502e2d77daa666a73c4a2c2cd3d45408203381eedd80c875b5f86c5eb126f66086b390769e2599792904af236f6a3a4393a14ea21c78335a2725d85c4c03bb1ed1c783e9f575a1bc6ebe91d873f"}) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r4, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r4) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000000c0)={0x980000, 0x4, 0xfffffff9, [], &(0x7f0000000080)={0x9b0972, 0x233, [], @p_u8=&(0x7f0000000040)}}) 22:17:48 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d0000"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:48 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000040)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0xc8, 0x1) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:48 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:48 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:48 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r0) 22:17:48 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:48 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x0, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:48 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$USBDEVFS_DISCSIGNAL(r1, 0x8010550e, &(0x7f0000000180)={0x101, &(0x7f0000000740)="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"}) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="100000001701070000002f66696c6530"], 0x10) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x6, 0x80440) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000080), &(0x7f0000000100)=0x8) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000001c0)={0x0, 0x1}, 0xc) socket$inet6(0xa, 0xf, 0x1) 22:17:48 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d0000"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:48 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$amidi(0x0, 0x3, 0x200000) r1 = syz_open_dev$sndpcmc(0x0, 0x1, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f0000000280)) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x9}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_DEBUGREGS(r0, 0x4080aea2, &(0x7f0000000680)={[0x100000, 0x5000, 0x4000, 0xd000], 0xffffffffffffff4c, 0x48}) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0xf8, 0x5, 0x3, 0x16, 0x0, 0x8, 0x5, 0xff, 0xf8, 0x3, 0x3}, 0xb) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x80, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000240)={0x5, 0x1, 0x7, 0x8, 0x20}, 0x1) ioctl$sock_bt_bnep_BNEPCONNADD(r3, 0x400442c8, &(0x7f00000001c0)=ANY=[@ANYRES32=r0, @ANYBLOB="010000000000c41310f4ac78dda137e6d3aca5312dae8df54e284e610f5b2e5860ae97c9e6118aae0f6c132a42f99d27a5a63a6746000000000000000000000000000000001000000000"]) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) r5 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/enforce\x00', 0x2200, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r5, 0xc06855c8, &(0x7f0000000740)={0x6, 0x8, {0x56, 0x787c, 0x4, {0x7, 0xfff}, {0x200, 0x1d}, @ramp={0x1ff, 0x2, {0x8, 0xffff, 0x8, 0x5}}}, {0x57, 0x3f, 0x7, {0x9, 0x81}, {0x3ff, 0x4}, @rumble={0x0, 0x9}}}) write$vhci(r4, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r4) setsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000080)=0x4, 0x4) 22:17:49 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x0, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:49 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d0000"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:49 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:49 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:49 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x400000, 0x0) r2 = syz_open_procfs(0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000180)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f0000000240)={r3, 0x0, 0x3a1}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f00000000c0)={r3, 0x0, 0x3}) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000240)={0x5, 0x1, 0x7, 0x8, 0x20}, 0x1) ioctl$VFIO_IOMMU_GET_INFO(r0, 0x3b70, &(0x7f0000000000)={0x10}) socket$inet6(0xa, 0x0, 0x0) r4 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r4, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) accept$ax25(r4, 0x0, &(0x7f0000000100)) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:49 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:49 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040), &(0x7f0000000080)=0x8) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r0) 22:17:49 executing program 1: unshare(0x20020000) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x82000, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1d) 22:17:49 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x0, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:49 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_dev$dri(0x0, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x8001, 0xc0f}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000080)={r4, 0xfff, 0x81, 0x800, 0x9, 0x4}, &(0x7f00000000c0)=0x14) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:49 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x9c0be) pipe(0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:49 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d00000008"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:49 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001640)={{{@in=@local, @in6=@ipv4={[], [], @loopback}}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000001740)=0xe8) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x40, &(0x7f0000001780)={[], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@permit_directio='permit_directio'}, {@dont_measure='dont_measure'}, {@obj_type={'\b\x00\x00\x00\"\x00', 0x3d, 'devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81'}}]}) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) pipe2(&(0x7f00000018c0), 0x800) r0 = socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, @perf_config_ext={0x400, 0x4}, 0x0, 0x0, 0x863, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0x3, &(0x7f0000000080)=[{&(0x7f0000000240)="483e99b0bb3e7e653341d38881e0f4ee0f77d2d37af33fb42b9308ad8c4bc627144af242c7aaefc2733ed5cccb25c205b5c9e582cc9432b08509b28460ac8a311bf10f07115a600b0dc7c8c73b7ff6095faa592ff496e2878414b0830ba8b2af1c92e48e21112dc5babd4288c17d80cb1c968c4cf5d50e4235b643d3ca75685a9af888d2a6922a8c73d99c2467cc43cabfba36fb3edd3a3487bfd77798930cbf21ee93c6dcd5b52f920df8fb1d2627cd45d22716a74af78d4fe59a9a2b97a48d545d8b485c55c1d1ceee10b254dfe96f362cc418c18b734bb9e3", 0xda, 0x4a}, {&(0x7f00000005c0)="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", 0x1000, 0x80}, {&(0x7f0000000340)="c62d582813cea466254dbb3bc400b851b2d812e5fc6da426f2b93d626e1f7ddeb3012ddfb38fa6cf9a4a732afb21a327efff5140137774f91d0609bd9c1597165ab8049c7f09ca1831f4c4bb31a52b41a461ed7355b3b4956b48b5f9dd4e6a79394104531ecb7a016a7e19553e687ff870ca227d57a83fb5172b80b1b8f0950c900ab44e5237624d2f2efe3f733f7b3e9a8bcab1444f5e34694e71057a95a4b9aff68e362137bc572c1a20b64e63cedbab6f70a703cd17bc17570803a3fd5e93e291ec452d07119deec157426ad4829bdaa5cad821b7efa746eee879ddb2161ca31e80df4d2f29edc6779c026f", 0xed, 0x1}], 0x1200043, &(0x7f0000001940)=ANY=[@ANYBLOB="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"]) listxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000440)=""/26, 0x1a) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000001900)=@req3={0x3, 0x4, 0x80000000, 0x3a860b75, 0x6, 0x100, 0x9}, 0x1c) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:50 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r2 = syz_open_dev$dri(0x0, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) r7 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r8 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x22) r9 = openat$vhci(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vhci\x00', 0x7b6fcd6262b3354a) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000340)={0xfff, &(0x7f0000000300)=[r6, r7, r1, r8, r9, r4, r10, r4]}, 0x8) r11 = dup(r4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r11}) getsockname$packet(r11, &(0x7f0000000040), &(0x7f0000000080)=0x14) close(r1) [ 944.542079][ T3022] gfs2: Unknown parameter 'smackfsfloor' [ 944.640049][ T3046] SELinux: security_context_str_to_sid(user_u) failed for (dev bpf, type bpf) errno=-22 22:17:50 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:50 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x9c0be) pipe(0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:50 executing program 5: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) ioctl$KVM_ASSIGN_SET_MSIX_NR(r3, 0x4008ae73, &(0x7f00000000c0)={0x3, 0x9}) unshare(0x20000400) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYCAP(r4, 0x80685600, &(0x7f0000000040)) 22:17:50 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d00000008"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:50 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x4000, 0x0) utimensat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{0x77359400}}, 0x100) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x7f, 0x1}, 0x7) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:50 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:50 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) r1 = syz_open_dev$dri(0x0, 0x0, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r4 = dup(r3) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r4}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x78, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0xfffffffb, @local, 0x1}, @in={0x2, 0x4e22, @rand_addr=0x7}, @in={0x2, 0x4e24, @multicast2}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e22, 0x8, @ipv4={[], [], @loopback}, 0x7f}]}, &(0x7f0000000140)=0x10) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r0) 22:17:50 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x800, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:50 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d00000008"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:51 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x9c0be) pipe(0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:51 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = getpgrp(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x63, 0x0, 0x0, 0x0, 0x7f, 0x40005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10180, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, r0, 0x13, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000000)=ANY=[@ANYBLOB="ff010000000000000a004e2000000003fe8000000000000000000000000000bb0900000000000000000000000000b10a21b952b92e67881bedb100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000010000000a004e200000ba77fe8800"/260], 0x110) 22:17:51 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) sched_setattr(0xffffffffffffffff, &(0x7f0000000040)={0x30, 0xd46e9d5837ed212b, 0x0, 0x10000, 0x80000000, 0x1, 0x800000000, 0x7}, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) syslog(0xa, &(0x7f00000001c0)=""/193, 0xc1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) recvmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f0000000080)=@un=@abs, 0x80, &(0x7f0000001540)=[{&(0x7f00000002c0)=""/204, 0xcc}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f0000000140)=""/52, 0x34}, {&(0x7f00000013c0)=""/198, 0xc6}, {&(0x7f00000014c0)=""/28, 0x1c}, {&(0x7f0000001500)=""/53, 0x35}], 0x6}, 0x40) close(r0) 22:17:51 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) r0 = syz_open_dev$dri(0x0, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) vmsplice(r3, &(0x7f0000000680)=[{&(0x7f00000000c0)="d571ec91bbec696eca5a4e4f97a019a279fad6fa200bb8b41e74af00", 0x1c}, {&(0x7f0000000100)="440c75caba", 0x5}, {&(0x7f0000000180)='O*', 0x2}, {&(0x7f0000000240)="43dea9cfb8b922a09ae8d1f6a770b8174d087d3a7c27a6ed92db7d0c77fb68b57304c9836c73374d027af5da36683f1073526972d3aa1e4bd9e2a7be3e189c5d5a325be0c9d11c76d803a4932be5fdc579e2fbe1b1d3a181d7d0e335b9bc354177aab514f2b452916acfbd0ef2d3db34cd93cca1b41c851bbb26f4eff7509fda9ffd9af6df9584e9e565236daf00d10dcb9207360d3cd8edcad910b9171e2b", 0x9f}, {&(0x7f00000001c0)="3d119586a1dc6aff0201ee631082d745253032a8ebfc0e09c733d184ee23a55a", 0x20}, {&(0x7f0000000300)="cd38a06bcba14f1f0c2a6c6f797a44f4150a9a33c93542c0d5ce761c9e49c6b6f1976eb01b0b3e0648c1e6635232076dccc83cd69da0b6d40fb02ade5d25e4d58a8058af452197f493c12d18c9c2b4bdcbfef7aa017f9f9275cd46a2f1bd56c20cb6f53ca1ca6511103e32ca978fb4310749712feb35c1b06ac06c6a9819d8db7de7e02039297645cc341556e27ea48a27746204d37e1605de7df824fa1dec958d0583a067f5ff88363b1ec6de4fd6bf258ceefe6da873df59524a3dc3cdab242fe69c2eeecba117", 0xc8}, {&(0x7f0000000400)="1525a1145c3c0c", 0x7}, {&(0x7f00000005c0)="8609609dc2d71ed588aef60a53fe97268fced26cd41b42599546f357c09a5baa1172516173873fd6b38c4cac7807011683629c4893965c6b46a5b6da848b08f4b3616b83e7688c4ac2e3e3af37da4ebc0a84beea11f673e11394f9fd40ffd9dec43a555e424ea34045c8057d6620ca7dd973ce2b0d16ff2823b20fdd4aac777bfe09890139c0e3840d72f9224dd0ea4c708ee656d143d9e70e93c8ae9d72e1a60f95c05f60d5d2e33908af08026a7ce7a053355f6bc67070dd254da6", 0xbc}], 0x8, 0x1) r4 = socket$inet6(0xa, 0x2, 0x2) rmdir(&(0x7f0000000580)='./file0\x00') accept4(r4, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, &(0x7f0000000080)=0x80, 0x604a2fec72b479a2) 22:17:51 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:51 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d0000000800"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:51 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:51 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000000)) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:51 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) r0 = open(&(0x7f0000000040)='./file0\x00', 0x105002, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000080)=0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r2 = syz_open_dev$dri(0x0, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r5 = dup(r4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r5}) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r6, 0x84, 0x19, &(0x7f0000000140)={r7}, 0x8) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="af000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r8, 0x84, 0x19, &(0x7f0000000140)={r9}, 0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000001c0)={r7, 0x98b1, 0xebc, 0x80, 0x800, 0x7fff, 0xfff7, 0xffffff7f, {r9, @in={{0x2, 0x4e20, @rand_addr=0x8}}, 0x7ff, 0x7f, 0x80000001, 0x1e, 0x7}}, &(0x7f00000000c0)=0xb0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, &(0x7f0000000140)={r10, 0x5045}, 0x8) close(r1) 22:17:52 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:52 executing program 5: unshare(0x20020000) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x200, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r1, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r2, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000240)={0x5, 0x1, 0x7, 0x8, 0x20}, 0x1) r4 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r4, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r5, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) r6 = socket$bt_bnep(0x1f, 0x3, 0x4) r7 = syz_open_dev$dri(0x0, 0x0, 0x0) r8 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE(r8, 0x80084504, &(0x7f0000000180)=""/54) r9 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r9, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r11 = dup(r10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r7, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r11}) connect(r11, &(0x7f0000985ff8)=@ax25={{0x3, @default, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @bcast, @default]}, 0x80) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r6) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:52 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:52 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d0000000800"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:52 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x13e) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x2, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:52 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmc(0x0, 0x1, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x19, &(0x7f0000000140)={r2}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000040)={r2, 0x8}, 0x8) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r3, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r3) 22:17:52 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:52 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:52 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) r0 = syz_open_dev$dri(0x0, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000100)={&(0x7f0000000000)=[0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0], 0x2, 0x8, 0x3, 0x1}) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') ioctl$DRM_IOCTL_FREE_BUFS(r3, 0x4010641a, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[0x5]}) 22:17:52 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d0000000800"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:52 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0x9f, "10654b91202ecdb8e8ecd9279db513f2941a87ea4ef20bb4797bae0f2fa09e1bb05ae7d4499abed408cedb7cf7763fe7ef8236c71f7b1b51851a8e2ebc3608dd96f3e825498c88d7469e36d35050f8aaa6a29c05c05ebb5a3531a28454fa1cd612e2c3c50601f9f6128b5a7a3b3e3b973bf94548613e5b14bf78c85714bb988a676d3eaa652b3aa9f35dd3aac32e3a687be1fc9b20ca51c7b35c0ac165534b"}, &(0x7f00000000c0)=0xa7) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000180)={r1, 0x3d, "17a23e4509e0a3c5c2ff963ccbe936ad4404dbe557199bc66da25afd424f1057733640ec897e23772b952c290baf29d8b1fdad7911581049fe1413547c"}, &(0x7f0000000100)=0x45) 22:17:52 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:52 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x5, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x4000) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xad0, 0x9}, 0x80, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r0) 22:17:53 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:53 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000340)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x2081410, 0x0) socket$inet6(0xa, 0x0, 0x0) setxattr$security_ima(&(0x7f0000000440)='./file0\x00', &(0x7f00000004c0)='security.ima\x00', &(0x7f0000000500)=@v1={0x2, "93834d25be83f0"}, 0x8, 0x0) r0 = syz_open_dev$dri(0x0, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_buf(r1, 0x0, 0x29, &(0x7f0000000240)="42745fb2c736f4118321939b89ecd0c26ccde9fcfe584fd06af06acf0c5e77af306c729e7be376cfd7af748a456ae9d9af68cda5558fbb88697d13ba8de7efe6bedcbc4961353d74a2f843b18c4871077bca4760a8b4cc02c36b93cbd0565252c4e93539d4bc3895776e8fd0c9a40496c17e658bc7a87655e13543312f105aa52632f2294b0f4f43fade8bcb85b8ef74fb9706b0c295ceaa3ce457a21880c4dc843d9b0253d154d1028aa7788b3374", 0xaf) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000100)={0xfffffffb, 0x20}) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r4 = dup(r3) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r4}) close(r0) rmdir(&(0x7f0000000580)='./file0\x00') getsockopt$inet6_dccp_buf(r4, 0x21, 0x0, &(0x7f00000001c0)=""/64, &(0x7f0000000200)=0x40) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e24}, 0x6e) 22:17:53 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYBLOB="020026bd7000000000000d000000080004"], 0x2}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:53 executing program 1: unshare(0x20020000) r0 = syz_open_dev$dri(0x0, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$TIOCSPGRP(r3, 0x5410, &(0x7f0000000000)=r4) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:53 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:53 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:53 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYBLOB="020026bd7000000000000d000000080004"], 0x2}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:53 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clock_adjtime(0x0, &(0x7f0000000240)={0x20, 0x81, 0x4, 0x65f, 0x2, 0x3ff, 0x80000000, 0x20, 0x1, 0x6, 0x6, 0x2, 0x9, 0x9b, 0x8, 0x9, 0xffffffffffffff6b, 0x7, 0xf7, 0x6, 0x800, 0xd8b9, 0x9, 0x2c3, 0x5, 0xff}) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x0, 0x844441) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000000c0)=0x2, 0x4) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x286a, 0x501200) ioctl$PPPIOCGUNIT(r1, 0x80047456, &(0x7f0000000040)) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:53 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x23) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@md5={0x1, "12bd9f73b00cca4f080982e1439c2b05"}, 0x11, 0x1) socket$inet6(0xa, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0xcfa4bdeb9d0775b9, r0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000017c0)={0x0, 0x400}, &(0x7f0000001800)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000001840)={r3, 0xf7f0}, &(0x7f0000001880)=0x8) 22:17:53 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:54 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:54 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYBLOB="020026bd7000000000000d000000080004"], 0x2}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:54 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x6) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000240)={0x5, 0x1, 0x7, 0x8, 0x20}, 0x1) read$rfkill(r0, &(0x7f0000000000), 0x8) 22:17:54 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:54 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:54 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:54 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x2}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:54 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=r1) 22:17:55 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) timer_gettime(r0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x403, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)=0x0) setfsgid(r1) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:55 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:55 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:55 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x2}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:55 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:55 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:55 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x2}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:56 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:56 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:56 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:56 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000480)='omfs\x00', 0x10000, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x19, &(0x7f0000000140)={r2}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000080)={r2, 0x2}, 0x8) socket$inet6(0xa, 0x0, 0x40) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:56 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:58 executing program 1: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x5, 0x1, 0x7, 0x8, 0x20}, 0x1) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfa, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) fcntl$setpipe(r0, 0x407, 0x3) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) move_mount(r0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x29) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x39) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x426, 0x0, @perf_config_ext={0x10000, 0x1}, 0x600c, 0x0, 0x3f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000000)=0xe4b9) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='ip6gretap0\x00', 0x10) 22:17:58 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:58 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, 0x0, 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:58 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:58 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:58 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:58 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, 0x0, 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:58 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:58 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='openpromfs\x00', 0x22, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000240)={0x6, {{0xa, 0x4e23, 0x7ff, @loopback, 0x9}}, {{0xa, 0x4e20, 0xffff, @remote, 0x8f26}}}, 0x108) 22:17:58 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2000, 0x0) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x2, 0x4, 0x20, 0xf0, 0x0, 0x6, 0x4104, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x401, 0x2, @perf_bp={&(0x7f0000000080), 0x2}, 0x10482, 0x3, 0xe7, 0x5, 0x0, 0x20, 0x800}, r1, 0xb, r2, 0x16) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000040)={{0xffff, 0x6}, 0x10}, 0x10) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x200000, 0x0) bind$bt_rfcomm(r3, &(0x7f00000001c0)={0x1f, {0x9, 0x81, 0x81, 0x0, 0x81, 0xb3}, 0x1}, 0xa) 22:17:58 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:59 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, 0x0, 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:59 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB='(\x00', @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:59 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:59 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB='(\x00', @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:59 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:59 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:17:59 executing program 5: unshare(0x20020000) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x8) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x5, 0x1, 0x7, 0x8, 0x20}, 0x1) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x40000) r3 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0xe5, 0x42) r4 = getegid() keyctl$chown(0x4, 0x0, 0x0, r4) setfsgid(r4) write$FUSE_ATTR(r3, &(0x7f0000000180)={0x78, 0xfffffffffffffffe, 0x8, {0x4067b0e3, 0x4, 0x0, {0x1, 0xfffffffffffff001, 0x3, 0x3, 0x3, 0x2, 0x3, 0x4, 0x7, 0x6a, 0x8c, 0x0, r4, 0x7f, 0x1ff}}}, 0x78) mkdir(&(0x7f0000000140)='./file0\x00', 0xec) sendto$rxrpc(r2, &(0x7f0000000740)="17a0182c8c1ca7685a7867d8b90e1476046d9d11f1c3b3dfdc6fbfd46f055c9ac9e8a72c396453b0866c38592eff14a739a2039862586711137f905bd3bbacb427864fc9921ee10d298f6c74d958c3b596c2b9365292d6648c8014a5ba947411e8a983b52cabaae9b4887f59f7447e764c446312e0381736560fe30e91e2afdac878a5c7e87bd03cf73c19adf564f5c4b01603b5cb051f5ad4a601bc672587f4e0948a26cc8aed737ac9b65bf0469631386d28e23b0d4ee17bb65d85187bfe6452e246964100e0aaf530b8663168a6de1ea5ee34ebf95d67a11d2a2745c461b5f240f715a2472b53e80f68782242a434d19aece3dbffc4ccf75a0ba27ecc07045c744153e72c8f7fc2fa3821e778f63800f9aa9b41a64ecf08898aac06ff96aeceaa0d122dfa53b22136908fc386693cbd35d8fd62a7a8e240af77dc5392e597bd91dbb47c289f6da3fe8a1ecf72a214a14e5989be4de6394b2a6b4cd5b544d545be8e2fae2010221fca0b82cf77c4027e0bf77456ea8f6c8ceca8093a3620a771f6768d8cfa02e3b98f616012c61cd5a0b6bada2c553bf812b735dc33b7dec0f1e707bed3decb9cc8fbbdd3555c641d45a908ef8fcac7b113dae34d056c5fefb50684ea6034806b47e5205e90be3ea87cf365fcb3079a8fd16a218b8b2e0a67c0d786dad165cceb190edc432f0c75464a5082c1f05583538c8203755ff42cbfd807a6c75e4542833d36da2623944bcc77a69b2343208ed627b46993ffda4790b12141c6c89b9fc4e53e723c7e88b53872789b3765cf942489466584f927a408b497d209e6604041371d1c83a9c6d0ab02a3f59a9fb50c936b448da7b31a9ebab5b97be5a665b640b1b303245bea2c4843e2cf80f36100ec92df9f7b882b128eea253831d8a99a15d8c546d7084fdd5a4a758fd9e5f40c16634aea341bbe7b445cef7f4cf80e6365887e2c0e35f76c7583ab1d5a51a942581cdda07868c96e4dc7c85e349b3ab37c3a9233da9284e3ab3318196423776bd67b2bf4b2414098062021bb4d78844491ccea1816f081f2bb7ec38d52dff0c0a1921acb4468b70156dad5764e4bddc8fe1c43def3bcf625652d01eae1d4ac27bd399bbbf2a121f99daebd3cdc2424ca8406e01b9afca5b86636a0562cc0250241e11065b700df3ea779698e3d7f91227c33f2be87c69d5c75a3a17bad08aa2d379c42c09a50b0ca2c2044f6dcc62e35ce8ea466751fa9539eb35f55bc8cf534bfca3c5f0a24f198fbf250f5fd7a46132123226e6301f268cfc4c3229ad8818cdbc550a19a69ede69bec252a0b018561b014ed69baa6bed21c93b5793d99df47ae8ff4ca01c379cdb13312dacc7a61cc6222275f70ef2ccbec58be3cb51e2aa64069e29c6d10b32c54a2aaa5a65f265b2566dc8b06795e1539bddbfbe8a3b47d564901c74ccdce41e4a285826030ab8c889d4fee20a0cdd446ffe3c50618138fdcd80091e3601be5da6bb1ec4a1654176ea35afa4cb1e0ca769113baf0e4beb49cee286ca7c9060d783dbc7a27928c111c4fbe5394c4762689f7fb2b7e9202e4afff36681e7cf35d357d4968d9f24b2e6b6d7668e32e9b7d42d2bb6839fd54045c83f838654f673a05c0f5261e582cb91afd3d79de92d92a0a738d875acc0e6a9d6888a6678ba6fa1c6796cc09fb19c2c3f9e1d44b613999e83ee1bfc9c10e19cdf5a2951cd5447888d60e9b1fa34f1ff962921926ecefc110940392ce2d7a4d5e41c2a3e79b01bbb61190f0155eb93f7f05b0baa4bcee0e76ca31838b9a6c3cbe6f5110a7c5f4a371293c27f4f6061905d4750ffc433a43c48fc0e0d30a7303a9653ec856ea0f1a9c0e5e176040cc8fc96f0cdb246744c719f3851510c2812b9299970d3c8c4ae7eb984c61337428508086073e5c28bcc18b3bcb0e5a18532da3371b03bc4cc5cc005e6e4a765c5b0101f2dd2a2414a1588a37672a3c851908680629690a0528382b000e988c5ec7d90b3c9e93340a07cd70a51622e6435b6d9b2a63f579bed181a37402cb07ecef8b9e8f27106d05e71b9dbee343d5b428505e06b97b24fb2b65b92c34be86f7f6dca8715b17b5c529e32ce72bcb2714d80fea35c19c3d1784eab46189010c14419c7080b026a5d903d17f79342bc996eb9405cfa74a2391a389fa9bf43d8511fb1d51acd80cb76598103627a27ac1d33db5a8f99f77d27610ec77d66a8c5a34d6d626d1c5aeb783b6fb725b4b13368ae70df8ac0b79ecd894986ac3982b75361ea7916f259e869aa183a4c6933505e8f17e99814e530c2a6aa06411be2b3f06a4dccaf3253ba389210bcce424746289ec38da0284c18a3ffa7cc43b23b241919d87abc301751aead09ec93fbbfe7c4a1264c733a9455c3a17800b2c203db5735577bd5a7ef8b9efe45a789e9f805d09d19e8ad4f7458c60621c99e727bc3520e393bed56f9daabf796e3875946ebbdbfb5360a0a9c0671cff2fa3210e4a2354cdf30c27aea02f17428e5e42e9e4cd1b7fdf04f92617b14bd4203916463e26e259ae8de6a3f2ab5d2b8bc7dc5bbdfe932ac812f441f5e2fbde20e745c2c11d10f336173b13c563c23721807b6938bad4823417e974ac49b93e6c0d034b6172f0ca6612a966af36dae60a629b4624c5e173dc17e27fcc637a3e13ace0ed882b0b01f7530e904b97466e2e2f25f19135b30a4e4208bb7b25b3a3bd1a2afc84b52f19b5a8e6dda829ce07136f49503474c3bc2f2143d03d0164d1bc3616a1ef73a49a92ebcf71056e19fca3bcd63b7a5508a0f8afd85d3a447ebce5b9e7e815ddb90bd29168fe1b5a2db9ec54001264414f284c9ae73e79a3d3f7a46f460d21cc83b40690fe33ddcb6eea6fd4b944f48d7fc1691d6f1c285e0098e503600df0d0bda61d6e2b09931d996772df1c591bf34f33b8b54762c7eed7c3e5b8fc9ae1b4f470d2396d0bf7ba0bdf0a071310ead6f620dd6cd8d850dde7adec820a7c764cfc70f3b5c70f19864d8bbee6422e15f85d84cf36baf38941d964e1a657d8cb35c0fec588efef3731fb8b753a4f5bae5c69c0aaf0f28663c1a832e60599b24cc60c89301f07b773ffdbae1518663e320f9c3c1261b35fc980bd6771d60874c56b936a4e9e46e156d8a3e87682ca4ca6d76423341439227e30d8b961b57a027b80fae46bebd41301c3658a89c9dd5c4b9fc9f1e5d51529895b54aa7e2777b353f5ded6d40f9b5d58647372c1e42a458a6bdfe77c3a39449018e2eff69cf4f7f967e2f77ec39c67d518435a1183a2e16bfaa15b31f1667195f47fb6005906d88f3bd7e3f18d24e40d876846fb5a4d6a55bdb048d072e32d7313ba3a822c155d343ea4e92c051b7907681f760c2e6cef4991cbdb75ecdbdfc1655b6ec4d52c8155f7510c12b6d9ad9fe76c652bbd0114d75f5f8910b9cae4d133101b72bafd1078bf4fa0d7e603b8e925f9c9b3616ed16d204841a01a93b4012c3e48bc1963c7b123da024fbbc76396a467c7ca0d1d2c3aa7df6f81311e1344d116b69557705378b1d95b7643a484bac59e07e987a70b382e8b482674a65039b46622a4b4c562117ab87f99cbb2be5357636719c878ac2816b20ef817dfd85fbd362fa8d88519b82f0671d24bac3eb2a91586abccd86f4d0208dba65621d6ac54d42813f96cb8bf240574ed99f082cbc3ae6c0a016c6a1ade64237dd9cb9e88e07e0cb542686e37d971b6d8cea6c0f9e1fe2a0f3c700aeab4000d079c2143d7070104796d3b5cbf0738e94aa0f56ffc5acdcd4de12e4774a52a09c25a18a19c76aa511d2857e3c8cbcf32c37ec5c29fdc121a2385cbe8e76fe02d0cb0be5495d1d3e54cbddde51e69913cf6682aad3a4eb7fc2fff4779bf0fa7a9380aae51a57008486e21e6e962faa5a4f8712056443f5c8bf1e4b21fafe172834c69c9074662f8840c8239f3d144b7bb672d2b194f15637c3a0af2f871adb7cbe04d2b7c3f10bfd43e223d3e17bb8000ad3ef836b102a6acb273242cf11d523b860c6d2a6e8a62763b25cf53f048e674c67a6a229911de5df1f155b7578816ea4a03c37ade1f6d2c9381b4bf60f8b5383218362402fb5240f1e088f2da16c0edf1111336d8dbd1f4c604346a72cdab7ed1a304f75b1a6212881b4ea656616269dbb1128a647c10cd2753babe834b881c97e63e262804bca5ac6a92ada078139fa4a6ac38d65a17954639e300268b580c322829c5bdb447df14b8ac2776ea450628d148eb1296bc7cd25b809d70101cba5f12b84d3812d534066f35bd48c184b65dc356f189555bcf46eff52bdfff8249695021b22d402cabe57b54a7131a8558d6fbe22c468d5d1f959ed2a41b4bb00786a8b1c121a6d889e25b4f77e5f62a0132cb513d07c7b93b0323c79ddeca79c97e2a9028ef0d914cfee33107827b900de96dcba3d700338211b75366321007b0b5fdc117d1418787f50c2eddd61206ad4f12f196e2392bfb1977fa4021e08893389d50c5dfee627cc19f73826d7ba851d5f279b04b3043750bf4d30ecb5bd65003cb33dd4e12e81acf93bdd49de76f05f66385c706a71171e814d8c986122fec6e4b66a51ad48427d2b743ceb426985fa8546b01cdbeb9c04c4f146c2eafd390a71e414546df63095e00a3f5429b1ade1478b454c4e264f35c5d53fe8917f447342285f5ce9b6f7e5511d7dc9abf2d8ff928a5b68300257869c3617311a5577bc100a81d7bfe8a8c1fdd1791b4c3f5e91135fa56322aef46abc944b1728b9a23725221967c6453ab1fb543777f504ec5324732d78ae7929ece38d6034b3937f83b15871bb83a7d6e8d04b0c414eadbe8fee07901279116c6a9324b45985713b4ec4848a29888e5de6f3da3eb5e741c0e9fa6c7be4f42659ea190f364ca53f06fcc3f1413c1298e356660ac2b96e1452053c74512fdbb3f7c9c84531dcd521fa11e2d8888c259e703517007b2e047ff20fd81813f80ebc84b2c0622b69b5fa56a02ad4cc71c2fd041dc9bf66bce9118ae41b9a9a5c157ad8a5d18bf2740cab8b2c5539edc598088105eef0bf3779db799ede05b5b4fe630b6b73812fe67f2cc5fb723ed626bcbe03a3116ead75d56ac7f4d09ecbbb3387a5de89f7a88a2d07e55fbc9833369075ef5b6e0868d73f642f8e6c944abebd833999a15e023760199b81654fa5f17b692771a23dfea1dd1910df41d42cda9165a120d5fa9cb10c4f16291afa29ba7001af822f8a9303cc35845803e854f6a52c4e90136da81b6d73d9a3930ceb6cce18e6381d39775df5b61d9dd97e3ec14f5aca0ecb9c7df3c9e92fa1d15de175385433589ca612930d4006fb30fc36bc1ee55007a4cb1299368db38bd4d47612de36789ea9f888f3144b17a5c7c5d97f85fa5dc36b0a9c2c6a4e11c7a7597f7b8aa717d1e1bec5c0eafd0ae154a1aa5846af2702537b89206a68926e45485752fd40e026efb06c625005175b42324ba20248b2d894682188631e6539e8f4e339b1642d95e8c94bd24bdae92cdb01e4715cdfbba5309df10a4673d761b6bbe12465b5689ab72f17be3a39093e0bb0a7d603d2ffc3a7b97f08f744d520e9c3abdcc34a379f024f05d8f05ae03978b06d4c59747c5c267aa1bbcd6e6cb98a2d502b4bdfde39e44ae59d2049d70e26b08599e5e805d9b57d6e3ae16539cee64b39b26916439a49d7edbc9188790db971606a86a4bed67d410f9804388ecb7fbb25bf3a7ccc53e1e370f9daf777adf850c97a39381091ade0353e321b37dba71901fc186950b3de2dc40a40cc534e3c08795b3f8270e0171", 0x1000, 0x2004091, &(0x7f0000000100)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e24, 0x7ff, @ipv4={[], [], @broadcast}, 0x1f}}, 0x24) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='dax\x00', 0x218888, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:17:59 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:00 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000240)={0x5, 0x1, 0x7, 0x8, 0x20}, 0x1) r1 = getuid() r2 = getegid() keyctl$chown(0x4, 0x0, 0x0, r2) setfsgid(r2) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuseblk\x00', 0x35beafec97ecdd96, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}], [{@subj_role={'subj_role', 0x3d, 'devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81'}}]}}) socket$inet6_udp(0xa, 0x2, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:18:00 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB='(\x00', @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:00 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:00 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r0, 0x40206417, &(0x7f0000000040)={0x9a7, 0x80000001, 0x5, 0x7f, 0x0, 0x5}) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$isdn(0x22, 0x3, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:18:00 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:00 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:00 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB='(\x00\x00', @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:00 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:01 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:01 executing program 5: unshare(0x20020000) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f00000001c0)={0xe5, 0x0, 0x5219, 0x100, 0x0, 0x2, 0x1c}) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f00000000c0)={0x68, 0x2, &(0x7f0000000080)="910add7de20f369bc59c918397c3fafdd48d9c4671287859107c1322b2464b8527b7c72a8c7840d5353ce93ce3a625a203", {0xffff0755, 0x100, 0x31303553, 0x1, 0x3, 0x10000, 0xc, 0x101}}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, 0x0, 0x8, 0x70bd26, 0x25d7dbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$PPPIOCSMRU1(r2, 0x40047452, &(0x7f0000000100)=0x81) socket(0x4, 0x4, 0x1) creat(&(0x7f0000000000)='./file1\x00', 0x80) socket$inet6(0xa, 0x0, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) sendto(r3, &(0x7f0000000180)="6b3a5201b88ca1b8661e9d6f04504ff25d119452e015bab9cc7a71ee1548b3abe37c985bc683052631fa750e13f36555862c", 0x32, 0xc040084, &(0x7f0000000340)=@sco={0x1f, {0x1, 0x7, 0x3d, 0x3f, 0x7f, 0x1f}}, 0x80) rmdir(&(0x7f0000000580)='./file0\x00') 22:18:01 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB='(\x00\x00', @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:01 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:01 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:01 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000400)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r0}) r2 = request_key(&(0x7f0000000340)='trusted\x00', &(0x7f0000000380)={'syz', 0x0}, &(0x7f00000003c0)='key_or_keyring:', r0) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) ptrace$getregs(0xc, r3, 0x841, &(0x7f00000006c0)=""/248) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000440)={r2, 0xae, 0x6}, 0x0, &(0x7f00000005c0)="6dd916f24706fb92d21753a3172f7db204ad2f9cb88ba9d63f656cab1b7bbc49db02782094d05ccd2e5427d4cff89a12685525aab660bd63eee882f4f0049f3f940a223cae13d5f41ce4fcee35eac125753082ec6c947495b2985ad4b139a0408956bef163c6038959aa1dda5daf6e7ba91f7fbc9ffdbe0bd0b66ab607be9a0884e06b831399ebb5ddbaac45d33195cb6cd7ed4ad270b70853e0f6a466283836def4230d6b263ffa4d449144fc0c", &(0x7f0000000680)=""/6) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000400)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r4}) r6 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000240)="465b15b6e07625478d8129105b3ccc976a950d8e6bab3c271827b936975111ed438ed3be8700cfd6c7f05467dafffd9bb5f3879b3478e8e931209bb5c049b4d14ffb420095", 0x45, r6) keyctl$set_timeout(0xf, r5, 0x0) r7 = socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') ioctl$PPPIOCSMRU1(r7, 0x40047452, &(0x7f00000000c0)=0x3f) 22:18:01 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB='(\x00\x00', @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:01 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:01 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:02 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000005c0)='devpts\x00vh\xd2p!s\n@7\xcb\x855\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1\xfd\x1a\xedY\xf7\x1cg\x7f\x00\x00\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\x99,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x02\xd8\xc7\xc3,\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4/\xa0\xf1\xd7&[2\xf2\x82A\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3\x02!O+\xf2u\xa1\x8b_\x9fe\xfe[\x00\x00\x00\x00\xabq\xd00E\x18\x1d\xe0pj.#W\x13?\xee\xdcvGevH\xc5\xc1\xf8x%i\x9a]\xc2\xe9\xb0\xdd\xa1\xa7d+1\xed7 \\\xb6\x1d;\xf5\xba!\x90\x7f\x98%\xe0\xc6\x9c\xc8iN\x9c\x83\x81\xc6N\xf3\x10\xd5Z\x838R,\xa30&J\x12\xa8\xed\xf6t\x16o\x04h6\xabQ\x1a\xdaL\xdf\x12~zmV\xe8/\xae\x87\xca\xb9\xa8v\x15\x8d\xacP8\xf4\xdc\x14\xf7\x9f\xd7\xb4Q\x87\xa9\x8c\x913\xa0\xc0\xdd\xf1t\xe9\xed\x98\x1b\xc1\x7f\'\x8e5\x83\xf0\x8b\xcd\xfd\xa9\x121\xa7\xf7\xb0\xa2\xf2\xacwl\x93\xcb\x90\x04\xfc39V\xa37@\x1a\x02+\x1b^r!\x81\x8b\xe6\xc2A\xbd\xf0\xb4\t\x17\x81)\xa6\xc8\xae\xb3L\x95/L!\xa9\xb7h2\xc6\xbeM\x8d\x04}\xdc\x9d y^\x94;\xaf)\vg\xa3\xaf~\xed\xf6.h\xf1\xf9\xec\xac\x82\x88B\xf1\xa1\xdd\xda\xb7*\xd7\x15\xf6\xcabp\xa8\x0e\x1bd\xb1\xb0\x83@\x88\x9a(\x89\x01\xea=\xd1Dz\xdaWG\x84\xd3\xe5G\xf9\xa9\a\xc57N\x11\x9c\xd1\xadL\xe1\x1f\xcd\x93\x03\xba\xddz\x804\x97\x9d\bD\xe6J\xa8\x81]\x97e ;\xe7\xf6#\x01\xdf\b\xa6\x92\x04\x90\x06L\xf2dJq\xfcf\x06\xde$\xd1Zc\x85\xb7\x94\x95AJ\xc1\xe7\x98\x8c]\xc2\x18\xdfE0\xd6xoz\xb8!+0:\xc2\x9a\xb2/Oe\x1e\xf2HE[B\xfff<\xe6\xd4\xa5i\x8a\xa2\x9d[5tC\x1f\x00\x00\x00\x00\x00\x00\x00\'\xbf\xc0\x8dU\x8fu\x00\xda\x9a\x93\xc2f\x14\xefr\xbe\xd3\xef\x90\x12\x17\xf7Y\xb3\x98\xc0Z', 0x1000, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$exfat(&(0x7f0000000040)='exfat\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x5, &(0x7f0000000400)=[{&(0x7f0000000240)="f2778e53bf0d91c72243960aee9cf85d340d466debeb5a898810c6c4875cdf7c7d59fb5ac9bf9414b17523b7fd38bc04f7f43bac50d9d6d81caee7bc5d936ec90fa6f4ba9b19bfd9ce7c568eb9702b81f64f4672f581ed9502a95db2d87ee14e75b855d3c0cefd44d30ee123ab4d02c0689bf35d9b78f8df6edd1b6d49397560a58f9a9cd52f91bec52052f574e0a1799269e014bb1e3f9ae1b00229ae4d07d0471fd232", 0xa4, 0x20}, {&(0x7f0000000300)="0e7c4cf2e95b01963db033168524222f8f40b62d78216ae84beb8e57b56fec4eaab15db103c7ee9b9cbf75dabc2d43295d8308a1897bb316a85163aeed261a9e2673c7a3743284df1d051d2298af43588bc42f119500a59e8586021dcc122e24a162442100a36cc064fac38ee191240f6b79957dad6bdaa99b1466f12cbf45b17d8a476d7645a7dc510185b58e4fdbe1d44db3cf5a64e3bb6c3d88899fee6f57851c6fb34c7839357670075ea1629e876277f1b94460e243a2", 0xb9, 0x7}, {&(0x7f00000000c0)="b6f962820c555d18a719a6c531a64644e735f9e3697afc032e7c89e6bacf80b8bb35dc6684b46cf639b548535b619cb75c782ed65581c05aecf5b7095c682355df88ca6bfa4e229787ffa70b6fd3f49df6f550f15c73fd9ff2733c21e09e364d7d8ce25a5437e1f73edb608e", 0x6c, 0xffff}, {&(0x7f0000000180)="d6b77fadb4b6ce8d55ed9ea96cadfebffae83b286b5aae581501f52a3c6aaebb1dd71951b364b20f434ef840bb933e4ad755e089eb8ffa9c86f14f7d5632d2b9f809ec1b3d8bd57298cd2626114eadfe152648033eaf022508a5fa886cf561702dbce54bc04d9fca9ab9f5597dc7ed33", 0x70}, {&(0x7f00000003c0)="cd45e794642a0f", 0x7, 0x8}], 0x4, &(0x7f0000000840)={[{@discard='discard'}, {@namecase='namecase=1'}, {@errors_remount='errors=remount-ro'}, {@discard='discard'}, {@discard='discard'}, {@codepage={'codepage', 0x3d, 'macinuit'}}], [{@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r0}}, {@dont_hash='dOn\xb3\x00\x00\x00sh'}, {@obj_type={'obj_type', 0x3d, 'root'}}]}) rmdir(&(0x7f0000000580)='./file0\x00') r1 = syz_open_dev$dri(0x0, 0x0, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r4 = dup(r3) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r4}) ioctl$KVM_GET_MSR_INDEX_LIST(r4, 0xc004ae02, &(0x7f0000000540)={0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) [ 956.712311][ T3782] [EXFAT] Unrecognized mount option codepage=macinuit or missing value 22:18:02 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='gfs2meta\x00', 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r0, 0xc0305616, &(0x7f00000002c0)={0x0, {0x3, 0x4}}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x80040, 0x0) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f0000000100)={0x3}) r2 = syz_open_dev$vbi(&(0x7f0000000300)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r2, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) r3 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x9, 0xdc6cef28f61924d3) getsockopt$CAN_RAW_RECV_OWN_MSGS(r3, 0x65, 0x4, &(0x7f00000001c0), &(0x7f0000000280)=0x4) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f0000000000)={0x8000000000, 0xffff}) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x4, 0x49, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000240)={0x5, 0x1, 0x7, 0x8, 0x20}, 0x1) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(0xffffffffffffffff, 0x800455d1, &(0x7f0000000040)) socket$isdn(0x22, 0x3, 0x21) 22:18:02 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}}, 0x0) [ 956.935809][ T3782] [EXFAT] Unrecognized mount option codepage=macinuit or missing value 22:18:02 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:02 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:02 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000000)={0x401, 0x9, 0x3705}, 0x8) 22:18:02 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f0000000000)) rmdir(&(0x7f0000000580)='./file0\x00') 22:18:02 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}}, 0x0) 22:18:02 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, 0x0, 0x0) 22:18:03 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:03 executing program 5: unshare(0x200a0000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f00000000c0)=0x80) rmdir(&(0x7f0000000580)='./file0\x00') setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000000)={0xffff, 0x0, 0x0, 0x4, 0x1}, 0x172) 22:18:03 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:03 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}}, 0x0) 22:18:03 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:18:03 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, 0x0, 0x0) 22:18:03 executing program 5: unshare(0x20020000) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x4000, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000040)=@rc={0x1f, {0x0, 0x4, 0x9, 0xff, 0x6, 0x6}, 0xc1}, 0x52, &(0x7f00000016c0)=[{&(0x7f0000000240)="947ed5f587d9c1853b67c8455f406ee0153a96701f4bdc06c25677007b46f9f65ea888f4808e02d71f18fee4f71eda866a3e8d35b9330cd09160667dd141e915152729ac44b5ea8290a8390d20eba4302690e40bb2ed6629a31830a4bf0d9234f0edceaf17f33f2d1e0b8c8bd95cb53e2a9c9e536d353cc9718617b33584120723aa4ed6851f92564dc22003a015f84cf108de260121131a6597369e4ffe9d45c20280211d37c8db8b09af57a248211727e40e21917a5a90b900689b955c49366278d84d9c0c54a67ca26de88d292c0757b33186cec29d7156eae8", 0xb2}, {&(0x7f00000005c0)="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", 0x1000}, {&(0x7f00000000c0)="857caa789943ad75c4f865078e62f8a061f1", 0x12}, {&(0x7f0000000100)="98b1595d4737ae087d595a8fe71dcbd1e8adb1d95732068b2c31933e685ed3fa785e0f6d9e200bb59581bf629413be70247c27967db9cc7123ca824aa851", 0x3e}, {&(0x7f0000000340)="03b156593d98569fa114baa7ad7dda50a22b56ebfeea8e7265e42374b554b6f7c2d9906470dca814f6c68eaa2eb0686f1fc1e7cfef5bdf6eb5a32cbf3898e3476dcfb321b9a05f4d799eb21463a35be1631144e2c80bbe6d435a87053af01df47eec0023cbfe5a8c9a1bfcbee4532182bda87663bd7e258899362fa63632658f5a1caf557b223eb7d65c3419faaaf629ee69125057f989315959f3c3546edebd71f13f0dbb76bb06221de609e77129f6cec2dda24eec768554c8fcd04d64851f3b5182cb586c177799fe1e", 0xcb}, {&(0x7f0000000180)="e092f6968b974bf3af0dfcdd0bb779387d275c6515445e68c39c97e7e3e2d0268e5edb42634ca6c961c941b35edcefb036c5620a6306569386368fb216eb00", 0x3f}, {&(0x7f00000015c0)="9c4dcd24f6eb6a94dc7511356ef13f8d1323d2c46fec9a45f999829a881924c11afb590061cb4b9345e842b710289044273036c9b9e0f30d322ec727ef870b49225c9ea3fbadba6eed7a140fa277f754947b6cc329a8c1d0db03fff1ec31249dd07914c196515a4fadec6db3afa6257c06bc717f4afeac9ffa79029621e0d1fe6bf5e07bd6fa809fdaf9c6a53b0798af997f821eaa81ca08c741a34e7472463672f88f7ae23aecc8c5fc4a5a378e26ba6b559ec919fd78e36bb6ba0ce042d681b294326bb6ad4a5eefa1f0689244f50d", 0xd0}], 0x7, &(0x7f0000001740)=[{0x20, 0x10c, 0x0, "8a917b05e9316a25ab"}, {0x78, 0x0, 0x1, "198ce5cae5a8dcc62f085488f4e43a2603c90de4f67ed7f1a4670d3ff7022afa9405d3ff68c4ee6b5d2f003fd9ed3eed7a04cbfb19cbd93801e06e839282d0879a790c1660cd52a87c5575814c0c6cbdadef952b03be8f7dd7194a7f530efa78b6"}, {0xd8, 0x88, 0xf8, "997fea676baeb81a27b4ff78b445a228e77661de859e3f6651163c969b641815443dee8b60da296d624326383a2e05273ecd1f16991c3548f93e8c0e294897e9fbc0dd614b2969ee0d624e46de3e9266c522731b5b783cc786e3c2ba2ead5910e363e2b85c473f85111a9a5df03e46d2319d61eaae8df46421bb23bbea13886de477976a8055fe538c949d7575381fec7b7bd088c060ed7048c847bc7e3cd873de5a7d0367795b503970d8967d6dd9a82f35bdf25b35255c8f7df55d8ba6edd1ed98b692e0f9820c"}, {0xe8, 0x108, 0xe4d, "6c8f97b0b3bc1bd206fce26ec533d440436ddfa280b0846b05ab46af16d0c303831c619370a568d7789b4ff05bc89dadc7a7e629d195dd90b4cc0adbbc51afd75748fe14c0379900ce6a6442e2d0623f50ead2ab3958f3a7c4f45d3c7473b74540ce36a0900a4e27c2394e499b6cc31247d6a43574539cb1a140eb7d772da18bf3eb3aca10623f330f6330373f3735b2add38c757250766ad5d2d5179fd462025af4de808a1c317ed010443d267edcc0a80d943e1a81c8f6f2ac380763f9b515011f061acd38eceae87f555f730b4a6bfb4cb5364413a1f4"}, {0x18, 0x356, 0x9728, "7108f8b1573d"}, {0x1010, 0x111, 0x80, "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"}, {0x108, 0x88, 0xfffffffc, "eba51fe156c8b233b5b91bb0b4e2a7a092ddff85698ab5c77ed55a97a3c8649d79f98d7bcc70047a81f555f0bf6fd50c0726c91d189e5cb981e2bb0c3d596e7986028dbcd0ad79277621e71feecc42373bc4d590bd4dd3b721df22789ded26c47a5cb36b03a7981aef7ef7cf89bc42b6d6afe8994c2c3828986d20fd86435cc40511f13b5cfd471d2d8b1e43f3f1769d4beee115aedff3837a6e6d0360f197070f4524922ef7e1a1a0c8fe9865d4b73f4d5672f2da05a822737e0eee920002bcad8c751ce407a1321ce54486e5e8ed41bdb6ad3b03fa631c84f37a0b56fde59326205892d4a9b00a85765f6b4f8dad84570231"}, {0x40, 0x0, 0x4ded, "acfaf12e501ecd98f560b48f3b5c75a7bca3b281d03f8d192124c63123fd99fa36838180555d093ce4d0"}, {0xe0, 0x110, 0x100, "ded5ac8c64ef8a221e603c7a26da80750b53eef1c90ef7a2dc088a7e2f9dcfa9e71be3f6a63e47f0c67c6ce34143ac214a4467066e8b3375212a16017c1a5a2748bc530b21cac01336a2b80a6274ff7197915093aedf192b3e5b2aece860bb09dbfb007a5be95ef82d05bbb84a8c7a1584844b9dde12ecddc98ef26f2f2812148e1fd1c6caa3e2768c4800c8971bb451064dd7ea790327aa399b0808aa58b712dfaa211374a03a13b2ec08ff594409c42c8012513e8a3018f89af8aaf7f06dc9898f2e2d15164585aea9c8e6ae"}], 0x14a8}, 0x200000c0) fcntl$setpipe(r0, 0x407, 0x3) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:18:04 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:04 executing program 1: ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f0000000000)) unshare(0x20020000) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) setrlimit(0x0, &(0x7f0000000040)={0x1ff, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:18:04 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}}, 0x0) 22:18:04 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, 0x0, 0x0) 22:18:04 executing program 5: unshare(0x20020000) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(0xffffffffffffffff, 0x114, 0xa, &(0x7f0000000080)={0x2, "5fa1"}, 0x3) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40, 0x0) accept(0xffffffffffffffff, &(0x7f0000000180)=@caif=@rfm, &(0x7f0000000100)=0x80) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000240)={0x5, 0x1, 0x7, 0x8, 0x20}, 0x1) connect$bt_rfcomm(r0, &(0x7f00000000c0)={0x1f, {0xfc, 0x3, 0x1, 0x5, 0xff, 0x6}, 0xfd}, 0xa) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400000, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:18:04 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:04 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:18:04 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}}, 0x0) 22:18:04 executing program 5: unshare(0xc0f666f4ec3006ff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:18:04 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:04 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:05 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:18:05 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:05 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x4, 0x204000) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000240)={0x6, 0x0, 0x0, 0xb493, [], [], [], 0x6, 0x3, 0x401, 0x6, "47d3dec98fbb7eb7d737e26af50fb20c"}) 22:18:05 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x80, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x8, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}}, 0x0) 22:18:05 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:05 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0/file0\x00', 0x400, 0x5, &(0x7f0000000180)=[{&(0x7f0000000240)="2c0e46a8777f36120347e279ba83a0212451af66c8addbeed62195e544aa29ba354c5de649267980c7086639ae5a3f9ebf7d44388f2b059ed53a334a7cdbd723110c383c3ddf2950ad9979bb664f31c99d3779d0f8cb092649bf951db355a11952090a21425e34da3354c7170ded79135358e23a639a1f5ec9fd1224fd1a162fd794cc855aef0fd5452bcf8d48fd2a086e7110f5d99e603f346682701b14e6ff0dd27a20d135af977e69584537dbf01fe99c0be2d06d12436bb6c10e984cbf9f17acdcdd30ee5177f79ebb9d", 0xcc, 0x5}, {&(0x7f0000000080), 0x0, 0x2}, {&(0x7f0000000340)="3506f5d1c43ca01e4d1d6428eb0de2497827542ccf61e1296020b9f5ba3889ccc54951bfa85b8059974421a1c17ed7411c9d5598edf073a20bc83702b07623391449bbf1a01c1f3111736492c52131104633bd2e020ddc2f5704a0ade2a03cedf583e290934285fd8b8dcf237a134b4b23e78d3b3e89985852aca6e480d0e0c1e4e95219b6d06e4c4865f31acbe761c10aa5271039116282dbb42d", 0x9b, 0x3d8}, {&(0x7f00000005c0)="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", 0x1000, 0x2}, {&(0x7f00000000c0)="44f11db24bb0b69e00b315bafd630486b955390212f5f9561099f325db0cb5423538edd6db77200cd9d3c2abb3257b650e62fa323514128d4d052c8fa060247622631e4f2b7f482963721c1a0aceb0ee1f7e12d5596a9e3d656454dc3f219250d889d86df4", 0x65, 0x1ff}], 0x2c402, &(0x7f0000000400)={[{@nodots='nodots'}, {@nodots='nodots'}, {@fat=@check_normal='check=normal'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@dots='dots'}], [{@smackfstransmute={'smackfstransmute', 0x3d, '!md5sum'}}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:18:05 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:05 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)=0x0) prctl$PR_GET_DUMPABLE(0x3) setxattr$security_capability(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000180)=@v3={0x3000000, [{0x6, 0x2819}, {0x3f, 0x200}], r0}, 0x18, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:18:05 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:06 executing program 4: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:18:06 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x84, 0x981c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:18:06 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:06 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240), 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:06 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:06 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f00000000c0)={0x3, 0x4, 0x9, 0x73fa, 'syz1\x00', 0xfffffff9}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x4, 0x0) connect(r1, &(0x7f0000000040)=@can, 0x80) rmdir(&(0x7f0000000580)='./file0\x00') 22:18:06 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:06 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0xc01, 0x0) write$selinux_create(r1, &(0x7f0000000040)=@access={'system_u:object_r:dlm_control_device_t:s0', 0x20, '/usr/sbin/cupsd', 0x20, 0xffffffff}, 0x4f) rmdir(&(0x7f0000000580)='./file0\x00') r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r2, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) ioctl$LOOP_SET_FD(r2, 0x4c00, r0) 22:18:07 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240), 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:07 executing program 4: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:07 executing program 1: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r9}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x4001, r6}]]}}}]}, 0x38}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={@ipv4={[], [], @multicast2}, 0x63, r9}) r10 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r10, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) r11 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r11, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) ioctl$TUNSETOFFLOAD(r11, 0x400454d0, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f0000000180)=ANY=[@ANYBLOB="e73200ffee734eff08f5af3e35068c7dd2b2aba2610bfb71ec79f5a4a601948343b5c6e53c03002ef6fef48cc0e7751e09e063a56c61ecefd03d74c2d2e0b2d9183278", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000240)={0x0, 0x0, 0x2, 0x38, 0x6, 0x0, 0xfffc, 0x3, {r12, @in={{0x2, 0x4e20, @broadcast}}, 0xffffffff, 0xffff, 0x1, 0x6, 0xfffffffc}}, &(0x7f00000000c0)=0xb0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x8) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:18:07 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:07 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) flock(r0, 0x8) 22:18:07 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240), 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:07 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:07 executing program 4: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0/file0\x00', 0x400, 0x5, &(0x7f0000000180)=[{&(0x7f0000000240)="2c0e46a8777f36120347e279ba83a0212451af66c8addbeed62195e544aa29ba354c5de649267980c7086639ae5a3f9ebf7d44388f2b059ed53a334a7cdbd723110c383c3ddf2950ad9979bb664f31c99d3779d0f8cb092649bf951db355a11952090a21425e34da3354c7170ded79135358e23a639a1f5ec9fd1224fd1a162fd794cc855aef0fd5452bcf8d48fd2a086e7110f5d99e603f346682701b14e6ff0dd27a20d135af977e69584537dbf01fe99c0be2d06d12436bb6c10e984cbf9f17acdcdd30ee5177f79ebb9d", 0xcc, 0x5}, {&(0x7f0000000080), 0x0, 0x2}, {&(0x7f0000000340)="3506f5d1c43ca01e4d1d6428eb0de2497827542ccf61e1296020b9f5ba3889ccc54951bfa85b8059974421a1c17ed7411c9d5598edf073a20bc83702b07623391449bbf1a01c1f3111736492c52131104633bd2e020ddc2f5704a0ade2a03cedf583e290934285fd8b8dcf237a134b4b23e78d3b3e89985852aca6e480d0e0c1e4e95219b6d06e4c4865f31acbe761c10aa5271039116282dbb42d", 0x9b, 0x3d8}, {&(0x7f00000005c0)="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", 0x1000, 0x2}, {&(0x7f00000000c0)="44f11db24bb0b69e00b315bafd630486b955390212f5f9561099f325db0cb5423538edd6db77200cd9d3c2abb3257b650e62fa323514128d4d052c8fa060247622631e4f2b7f482963721c1a0aceb0ee1f7e12d5596a9e3d656454dc3f219250d889d86df4", 0x65, 0x1ff}], 0x2c402, &(0x7f0000000400)={[{@nodots='nodots'}, {@nodots='nodots'}, {@fat=@check_normal='check=normal'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@dots='dots'}], [{@smackfstransmute={'smackfstransmute', 0x3d, '!md5sum'}}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:18:08 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0], 0x2}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:08 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) lookup_dcookie(0x10000, &(0x7f0000000000)=""/187, 0xbb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') r0 = syz_open_dev$dri(0x0, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) recvfrom(r3, &(0x7f00000005c0)=""/4096, 0x1000, 0x74ebd0b581713635, &(0x7f00000000c0)=@l2={0x1f, 0x6, {0x1, 0xff, 0x0, 0x8b, 0x5, 0x1}, 0x4, 0x3f}, 0x80) 22:18:08 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:08 executing program 4: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r9}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x4001, r6}]]}}}]}, 0x38}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={@ipv4={[], [], @multicast2}, 0x63, r9}) r10 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r10, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) r11 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r11, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) ioctl$TUNSETOFFLOAD(r11, 0x400454d0, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f0000000180)=ANY=[@ANYBLOB="e73200ffee734eff08f5af3e35068c7dd2b2aba2610bfb71ec79f5a4a601948343b5c6e53c03002ef6fef48cc0e7751e09e063a56c61ecefd03d74c2d2e0b2d9183278", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000240)={0x0, 0x0, 0x2, 0x38, 0x6, 0x0, 0xfffc, 0x3, {r12, @in={{0x2, 0x4e20, @broadcast}}, 0xffffffff, 0xffff, 0x1, 0x6, 0xfffffffc}}, &(0x7f00000000c0)=0xb0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x8) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:18:08 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r6}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x4001, r3}]]}}}]}, 0x38}}, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@empty, @in=@multicast2, 0x4e21, 0x400, 0x4e23, 0x1, 0x2, 0x20, 0x40, 0x2f, r3, r8}, {0x5, 0x80000000, 0x900000000000, 0xfffffffffffffffa, 0x9, 0xba, 0x93, 0x9}, {0x9, 0x5, 0x200, 0x4}, 0x7, 0x6e6bb9, 0x2, 0x1, 0x3, 0x1}, {{@in=@empty, 0x4d3, 0x3c}, 0xa, @in6=@remote, 0x34ff, 0x4, 0x1, 0x2, 0x9, 0x4, 0x8}}, 0xe8) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1, 0x800) r9 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r9, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r9, 0xc0305302, &(0x7f0000000040)={0x401, 0x1, 0x9, 0x77, 0x1, 0x4}) rmdir(&(0x7f0000000580)='./file0\x00') 22:18:08 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:08 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7ff, 0x3fc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:18:08 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0], 0x2}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:08 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:09 executing program 4: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r9}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x4001, r6}]]}}}]}, 0x38}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={@ipv4={[], [], @multicast2}, 0x63, r9}) r10 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r10, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) r11 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r11, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) ioctl$TUNSETOFFLOAD(r11, 0x400454d0, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f0000000180)=ANY=[@ANYBLOB="e73200ffee734eff08f5af3e35068c7dd2b2aba2610bfb71ec79f5a4a601948343b5c6e53c03002ef6fef48cc0e7751e09e063a56c61ecefd03d74c2d2e0b2d9183278", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000240)={0x0, 0x0, 0x2, 0x38, 0x6, 0x0, 0xfffc, 0x3, {r12, @in={{0x2, 0x4e20, @broadcast}}, 0xffffffff, 0xffff, 0x1, 0x6, 0xfffffffc}}, &(0x7f00000000c0)=0xb0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x8) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:18:09 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0], 0x2}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:09 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') restart_syscall() 22:18:09 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_dev$dri(0x0, 0x0, 0x0) r2 = syz_open_dev$dri(0x0, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r5 = dup(r4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r5}) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r6, 0x84, 0x19, &(0x7f0000000140)={r7}, 0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000000240)={r7, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xc}}}, [0x2, 0x1, 0xfffffffffffffff9, 0x4, 0x1, 0x3526, 0x3ff, 0x40, 0x2, 0x5, 0x4, 0x5, 0x43, 0x2, 0x4]}, &(0x7f0000000040)=0x100) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000100)={r8, 0x25e3}, &(0x7f0000000180)=0x8) r9 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r9, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r11 = dup(r10) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000380)={0x4, 0x8, 0xfa00, {r12, 0x7fff}}, 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r11}) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x4) ioctl$PERF_EVENT_IOC_REFRESH(r11, 0x2402, 0x52) r13 = getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r13, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:18:09 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x9c0be) pipe(0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:09 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:09 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, &(0x7f0000000000)=""/111) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:18:09 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x9c0be) pipe(0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:09 executing program 4: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7ff, 0x3fc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:18:10 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x9c0be) pipe(0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:10 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:10 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) r1 = shmget(0x3, 0x3000, 0x100, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r1, 0xb) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) accept(r0, &(0x7f0000000000)=@nl=@unspec, &(0x7f0000000080)=0x80) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') socket$inet6_sctp(0xa, 0x1, 0x84) 22:18:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) getpeername(r0, &(0x7f00000001c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, &(0x7f0000000040)=0x80) pipe(&(0x7f00000004c0)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 22:18:10 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(0x0, &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:10 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:10 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(0x0, &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 965.205298][ T4310] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 965.269775][ T4310] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=128, mo=a802c018, mo2=0002] [ 965.289936][ T4310] System zones: 0-9 22:18:10 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000340)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xc2\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94\x1b\x03E\xd2\x1e\xd2\x02\xeb\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81\xd3\b\xa2\x01^\xef\x8eMwE\x8cvNX\xa6\xf7\x10\xcf}\x0f\xc5\xfa&t\xcanM9\xb6\x1b&g\a\xc5', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') [ 965.339725][ T4310] EXT4-fs (loop4): orphan cleanup on readonly fs 22:18:10 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 965.413320][ T4310] EXT4-fs error (device loop4): ext4_orphan_get:1252: comm syz-executor.4: bad orphan inode 2 22:18:11 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(0x0, &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 965.560173][ T4310] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:18:11 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:11 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000d11000)=0x3fb, 0xa5) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000ec1000)=0x5, 0x4) bind$inet6(r1, &(0x7f0000bcefe4)={0xa, 0x4e20}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4000000000000002, &(0x7f0000ec1000)=0x5, 0x4) bind$inet6(r2, &(0x7f0000bcefe4)={0xa, 0x4e20}, 0x1c) r3 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r3, 0x1, 0x2, &(0x7f0000d11000)=0x3fb, 0xa5) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e1f, 0x3, @local}, 0xffffffffffffff92) r4 = socket$inet6(0xa, 0x6475ab141d338be2, 0x0) r5 = syz_open_dev$dri(0x0, 0x0, 0x0) r6 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r6, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r8 = dup(r7) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r5, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r8}) setsockopt$sock_int(r8, 0x1, 0x2, &(0x7f0000d11000)=0x3fb, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) r9 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r9, 0x1, 0xcf88c544f6530928, &(0x7f0000d11000)=0x3fb, 0x4) bind$inet6(r9, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) r10 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r10, 0x1, 0x2, &(0x7f0000d11000)=0x3fb, 0xa5) bind$inet6(r10, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) r11 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r11, 0x1, 0x2, &(0x7f0000d11000)=0x3fb, 0xa5) bind$inet6(r11, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) r12 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r12, 0x1, 0x12, &(0x7f0000d11000)=0x8, 0x4) bind$inet6(r12, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) socket$inet6(0xa, 0x2, 0x0) 22:18:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) getpeername(r0, &(0x7f00000001c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, &(0x7f0000000040)=0x80) pipe(&(0x7f00000004c0)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 22:18:11 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', 0x0, 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:11 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 966.298973][ T4365] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 966.332674][ T4365] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=128, mo=a802c018, mo2=0002] [ 966.370944][ T4365] System zones: 0-9 22:18:11 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', 0x0, 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 966.425290][ T4365] EXT4-fs (loop4): orphan cleanup on readonly fs [ 966.482704][ T4365] EXT4-fs error (device loop4): ext4_orphan_get:1252: comm syz-executor.4: bad orphan inode 2 22:18:12 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0xffff) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x402082, 0x0) socket$inet6(0xa, 0x217f8529717a1b5d, 0x7) rmdir(&(0x7f0000000580)='./file0\x00') r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x200, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x19, &(0x7f0000000140)={r3}, 0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000080)={r3, @in={{0x2, 0x4e24, @multicast2}}}, 0x84) [ 966.581940][ T4365] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:18:12 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', 0x0, 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:12 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d0000"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) getpeername(r0, &(0x7f00000001c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, &(0x7f0000000040)=0x80) pipe(&(0x7f00000004c0)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 22:18:12 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x1d, 0xd, "2e0e0230e4fd9e2f72c4bbf47529a25c25783bfe4e808ea8613fbeadce6cfa8423bb9a16036e9f8eab6ed795c892931bad8ef83cb86261b4402ac1889593be79", "3e83882de9c47dcd0fce82a6005f7572ffd97a89a3b0b8815ca85d2a4efed7b9", [0x5, 0x800]}) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f0000000600)={0x2f8, 0x0, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x3c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xbad7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x284000000000000}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffffc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}]}, @TIPC_NLA_BEARER={0xc0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x1, @mcast2, 0x4}}, {0x14, 0x2, @in={0x2, 0x4e21, @broadcast}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2a1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffff7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1000}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x400}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfc000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3792}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfffffff8}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7ff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffd}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7fff}]}, @TIPC_NLA_BEARER={0xb4, 0x1, [@TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth1_to_team\x00'}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x507}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'yam0\x00'}}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x74c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x0, @mcast1, 0x96}}}}]}, @TIPC_NLA_BEARER={0x60, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xcc, @mcast1, 0x1}}, {0x14, 0x2, @in={0x2, 0x4e24, @local}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'ip6gre0\x00'}}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xbe5e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x70}]}]}]}, 0x2f8}, 0x1, 0x0, 0x0, 0x24000080}, 0x8c0) 22:18:12 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:12 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d0000"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:12 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x4) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') [ 967.319003][ T4419] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 967.354394][ T4425] FAT-fs (loop3): bogus number of reserved sectors [ 967.384413][ T4419] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=128, mo=a802c018, mo2=0002] [ 967.403021][ T4425] FAT-fs (loop3): Can't find a valid FAT filesystem [ 967.451594][ T4419] System zones: 0-9 [ 967.461132][ T4419] EXT4-fs (loop4): orphan cleanup on readonly fs [ 967.496325][ T4419] EXT4-fs error (device loop4): ext4_orphan_get:1252: comm syz-executor.4: bad orphan inode 2 22:18:13 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 967.589551][ T4419] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:18:13 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d0000"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:13 executing program 5: r0 = dup(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000040)={{0xa, 0x4e23, 0xfffffffc, @loopback, 0x81}, {0xa, 0x4e21, 0x401, @loopback, 0x100}, 0xff, [0x7, 0x9c8e, 0x6, 0x2, 0x7fff, 0x20, 0x4]}, 0x5c) unshare(0x20020000) mkdir(&(0x7f00000000c0)='./file0\x00', 0xff044bff41fafe89) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') [ 967.838127][ T4451] FAT-fs (loop3): bogus number of reserved sectors 22:18:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) getpeername(r0, &(0x7f00000001c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, &(0x7f0000000040)=0x80) pipe(&(0x7f00000004c0)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 967.906196][ T4451] FAT-fs (loop3): Can't find a valid FAT filesystem 22:18:13 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:13 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d00000008"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:13 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)="6127b4dee86dff3d42c113927917ae6dd532fbd45891b36d3c42c7cdd2bb0871cdb6238d8ade", 0x26, 0xfffffffffffffff9) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000400)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r1}) keyctl$search(0xa, r0, &(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x0}, r1) rmdir(&(0x7f0000000580)='./file0\x00') [ 968.431931][ T4484] FAT-fs (loop3): bogus number of reserved sectors [ 968.459918][ T4481] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 968.475846][ T4484] FAT-fs (loop3): Can't find a valid FAT filesystem [ 968.533620][ T4481] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=128, mo=a802c018, mo2=0002] [ 968.559017][ T4481] System zones: 0-9 [ 968.567516][ T4481] EXT4-fs (loop4): orphan cleanup on readonly fs 22:18:14 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d00000008"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 968.585987][ T4481] EXT4-fs error (device loop4): ext4_orphan_get:1252: comm syz-executor.4: bad orphan inode 2 [ 968.692398][ T4481] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:18:14 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000040)=@srh={0xc4, 0x2, 0x4, 0x1, 0x1, 0x8, 0x9, [@empty]}, 0x18) rmdir(&(0x7f0000000580)='./file0\x00') 22:18:14 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) getpeername(r0, &(0x7f00000001c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, &(0x7f0000000040)=0x80) pipe(&(0x7f00000004c0)) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 22:18:14 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d00000008"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 969.078369][ T4520] FAT-fs (loop3): bogus number of reserved sectors [ 969.112390][ T4520] FAT-fs (loop3): Can't find a valid FAT filesystem 22:18:14 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) r1 = syz_open_dev$dri(0x0, 0x0, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r4 = dup(r3) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r4}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x7f, 0x4, [0x9346, 0x20, 0x3ff, 0x7f]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000580)={r5, 0x1000, "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"}, &(0x7f00000000c0)=0x1008) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') [ 969.360286][ T4530] EXT4-fs (loop4): bad geometry: block count 1080 exceeds size of device (1 blocks) 22:18:14 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:14 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d0000000800"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) getpeername(r0, &(0x7f00000001c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, &(0x7f0000000040)=0x80) pipe(&(0x7f00000004c0)) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 969.677133][ T4550] FAT-fs (loop3): bogus number of reserved sectors [ 969.711741][ T4550] FAT-fs (loop3): Can't find a valid FAT filesystem 22:18:15 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81\xa1%?w\xf3\x8c&\xd1', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)) r1 = syz_open_dev$dri(0x0, 0x0, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r4 = dup(r3) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r4}) sendfile(r0, r4, &(0x7f0000000200)=0x100000000, 0x7) r5 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x800, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r5, 0x4040aea0, &(0x7f00000001c0)={0x8, 0x1, 0x5, 0x0, 0x8001, 0x0, 0x4, 0x8, 0x5a, 0x8, 0x20, 0x7, 0x0, 0x3, 0x7, 0xba, 0x7, 0x7f, 0x2}) 22:18:15 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:15 executing program 2: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, r2}) r4 = dup(r3) r5 = syz_open_dev$dri(0x0, 0x0, 0x0) r6 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r6, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r8 = dup(r7) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r5, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r8}) getsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000a00)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) syz_mount_image$vfat(&(0x7f0000000200)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0xe46, 0x0, &(0x7f0000000940), 0x8648e8, &(0x7f0000000d40)=ANY=[]) r9 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x400040, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r9, 0x29, 0xca, &(0x7f0000000240)={0x5, 0x1, 0x7, 0x8, 0x20}, 0x1) r10 = syz_open_dev$dri(0x0, 0x0, 0x0) r11 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r11, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r13 = dup(r12) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r10, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r13}) r14 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r14, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, &(0x7f0000001680)={{{@in=@broadcast, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000001780)=0xe8) sendmsg$xdp(r13, &(0x7f0000001900)={&(0x7f00000017c0)={0x2c, 0xb, r15, 0x2f}, 0x10, &(0x7f00000018c0)=[{&(0x7f0000001800)="49b0a81319bbf4d1ac513abce8f38ad0f37796b8a75d7060df3bb113187fdde7e9a4cd04f826c3ed3939f1c3d8932bf395709ea0bfdefd1b759f8c89ecc180625bead536d80d5845023742ea10f34b9eca0eba3afce219938b2a2d6770f738b4126e1ed22f4160738031c27c0c6ca559ea36af0f0ef350a2e5e144082982737173278052367f8e629ba9fd1cec78265858c5fb3ee34ea915b6e43094d09c642026fb480f477075cf3651cf7070", 0xad}], 0x1, 0x0, 0x0, 0x4000000}, 0x4011000) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000140)={0x0, 0x80000, r9}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000001c0)={r16, 0x0, r4}) ioctl$EVIOCSABS20(r4, 0x401845e0, &(0x7f0000000040)={0x4, 0x7fffffff, 0x0, 0xc71, 0x9, 0x81}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x5, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r17 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r17, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r17) 22:18:15 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d0000000800"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 970.054271][ T4568] EXT4-fs (loop4): bad geometry: block count 1080 exceeds size of device (1 blocks) [ 970.082759][ T4577] FAT-fs (loop3): bogus number of reserved sectors [ 970.132144][ T4577] FAT-fs (loop3): Can't find a valid FAT filesystem 22:18:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) getpeername(r0, &(0x7f00000001c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, &(0x7f0000000040)=0x80) pipe(&(0x7f00000004c0)) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 22:18:15 executing program 5: unshare(0x66000400) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:18:15 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) r1 = syz_open_dev$dri(0x0, 0x0, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r4 = dup(r3) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r4}) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r4, 0x40405515, &(0x7f00000000c0)={0x3, 0x3, 0x5acf, 0x200, '\x00', 0x2}) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SG_SET_TIMEOUT(r5, 0x2201, &(0x7f0000000080)=0x1) close(r0) 22:18:15 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, &(0x7f0000000040), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:15 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d0000000800"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 970.467217][ T4606] IPVS: ftp: loaded support on port[0] = 21 [ 970.611932][ T4610] FAT-fs (loop3): bogus number of reserved sectors [ 970.672657][ T4610] FAT-fs (loop3): Can't find a valid FAT filesystem [ 970.742103][ T4607] EXT4-fs (loop4): bad geometry: block count 1080 exceeds size of device (1 blocks) 22:18:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) getpeername(r0, &(0x7f00000001c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, &(0x7f0000000040)=0x80) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 22:18:16 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x7c, 0x0, 0xf, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x103800, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000dc0)=""/146) close(r0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x4544e7c11511ebcc, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x9, 0x40200) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000240)={0x5, 0x1, 0x7, 0x8, 0x20}, 0x1) ioctl$DRM_IOCTL_GET_MAGIC(r4, 0x80046402, &(0x7f0000000e80)=0xf9) write$binfmt_elf64(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c46037f03f40600000000000000020003000600180026020000000000004000000000000000e60000000000000001000000610b3800010006000000090051e57464090000000600000000000000f8ffffffffffffff0700000000000000090000000000000002000000000000000300000000000000871be1fde38f7a635eb9000e6f0893d311e254056e209581870fb96daaa18c43a6da88b2b5dd736ee465c8bccc6cbd1ce4e47ebc939b87b4a5779fe892c54aff6a22219c06abd852f75d4f9cfbaed447cf405d6de9a702a78f4e804ebbf5f6db5da3db498d3d0efd91853aaf9f20c7e40300"/2793], 0xae9) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f00000001c0)=""/224) 22:18:16 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, &(0x7f0000000040), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:16 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYBLOB="020026bd7000000000000d000000080004"], 0x2}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:16 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0/file0\x00') [ 971.230712][ T4638] FAT-fs (loop3): bogus number of reserved sectors 22:18:16 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000340)={0x1000, {{0xa, 0x4e21, 0x8, @mcast1, 0x10001}}}, 0x88) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000240)={0x5, 0x1, 0x7, 0x8, 0x20}, 0x1) r1 = eventfd(0x2) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r2, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r3, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r3, 0x117, 0x5, 0x0, 0x2) close(r2) [ 971.301104][ T4638] FAT-fs (loop3): Can't find a valid FAT filesystem [ 971.358347][ T4650] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 971.436217][ T4650] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 22:18:17 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, &(0x7f0000000040), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 971.531627][ T4650] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 22:18:17 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYBLOB="020026bd7000000000000d000000080004"], 0x2}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:17 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000000)='./file0/../file0\x00', 0x20) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') [ 971.632203][ T4650] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=128, mo=a802c018, mo2=0002] [ 971.689078][ T4650] System zones: 0-7 [ 971.701591][ T4650] EXT4-fs (loop4): orphan cleanup on readonly fs 22:18:17 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) fchdir(r0) close(r0) r1 = syz_open_dev$dri(0x0, 0x0, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r4 = dup(r3) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r4}) ioctl$SG_GET_VERSION_NUM(r4, 0x2282, &(0x7f0000000040)) [ 971.744333][ T4650] EXT4-fs error (device loop4): ext4_orphan_get:1252: comm syz-executor.4: bad orphan inode 2 [ 971.822676][ T4650] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 971.902419][ T4674] FAT-fs (loop3): bogus number of reserved sectors [ 971.974402][ T4674] FAT-fs (loop3): Can't find a valid FAT filesystem 22:18:17 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYBLOB="020026bd7000000000000d000000080004"], 0x2}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:17 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) getpeername(r0, &(0x7f00000001c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, &(0x7f0000000040)=0x80) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 22:18:17 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{0x0}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:17 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000240)={0x5, 0x1, 0x7, 0x8, 0x20}, 0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000000)) 22:18:17 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) syz_open_dev$sndpcmp(&(0x7f00000011c0)='/dev/snd/pcmC#D#p\x00', 0x4, 0x86800) r1 = syz_open_dev$dri(0x0, 0x0, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r4 = dup(r3) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r4}) setsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, &(0x7f0000001240), 0xcff4f632) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x5, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) r5 = syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f00000001c0)="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", 0x1000, 0x200480d1, &(0x7f0000000080)={0x2, 0x4e24, @empty}, 0x10) r6 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r6, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r6) ioctl$DRM_IOCTL_SET_VERSION(r5, 0xc0106407, &(0x7f0000000140)={0x1d, 0xffffffff, 0x4fe, 0x5}) [ 972.404914][ T4705] FAT-fs (loop3): bogus number of reserved sectors [ 972.491421][ T4705] FAT-fs (loop3): Can't find a valid FAT filesystem [ 972.642789][ T4718] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 22:18:18 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) rmdir(&(0x7f0000000580)='./file0\x00') [ 972.703949][ T4718] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 22:18:18 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x2}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 972.791490][ T4718] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 22:18:18 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{0x0}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 972.870700][ T4718] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=128, mo=a802c018, mo2=0002] [ 972.926665][ T4718] System zones: 0-7 [ 972.956981][ T4718] EXT4-fs (loop4): orphan cleanup on readonly fs [ 973.002631][ T4718] EXT4-fs error (device loop4): ext4_orphan_get:1252: comm syz-executor.4: bad orphan inode 2 [ 973.047646][ T4747] FAT-fs (loop3): bogus number of reserved sectors [ 973.087343][ T4718] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 973.118866][ T4747] FAT-fs (loop3): Can't find a valid FAT filesystem 22:18:18 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000240)={0x5, 0x1, 0x7, 0x8, 0x20}, 0x1) ioctl$TIOCSRS485(r0, 0x542f, &(0x7f0000000000)={0x10000, 0x8, 0x4}) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:18:18 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x2}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) getpeername(r0, &(0x7f00000001c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, &(0x7f0000000040)=0x80) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 22:18:18 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{0x0}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 973.534340][ T4770] FAT-fs (loop3): bogus number of reserved sectors [ 973.585185][ T4770] FAT-fs (loop3): Can't find a valid FAT filesystem 22:18:19 executing program 5: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0xd7e1123767865b36) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:18:19 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='W\x00', 0x1) write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r1) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000600)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="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"], 0x68}}, 0x0) r5 = syz_open_dev$dri(0x0, 0x0, 0x0) r6 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r6, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r8 = dup(r7) r9 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r9, 0x29, 0xca, &(0x7f0000000240)={0x5, 0x1, 0x7, 0x8, 0x20}, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r9, 0x0, 0x483, &(0x7f00000001c0), &(0x7f0000000140)=0x68) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r5, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r8}) setsockopt$IP_VS_SO_SET_ZERO(r8, 0x0, 0x48f, &(0x7f0000000080)={0x32, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e21, 0x1, 'sed\x00', 0x38, 0x7, 0xa}, 0x2c) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100a1}, 0x242, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, r4, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0xfffffffffffffdf7}, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r2, 0x40086408, &(0x7f0000000040)={0x101, 0x12}) [ 973.715715][ T4779] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 22:18:19 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x2}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 973.757654][ T4779] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 22:18:19 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 973.814595][ T4779] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 973.877761][ T4779] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=128, mo=a802c018, mo2=0002] [ 973.946517][ T4779] System zones: 0-7 [ 973.966058][ T4779] EXT4-fs (loop4): orphan cleanup on readonly fs [ 974.025845][ T4779] EXT4-fs error (device loop4): ext4_orphan_get:1252: comm syz-executor.4: bad orphan inode 2 22:18:19 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r1, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f0000000040)={0x73622a85, 0x2}) close(r0) [ 974.109187][ T4800] FAT-fs (loop3): bogus number of reserved sectors [ 974.121108][ T4779] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:18:19 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x80040, 0x118) syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="9c00", @ANYRES16, @ANYBLOB="00012dbd7000fddbdf2506000000100001006e657464657673696d000000100002006e657464657673696d300000080003000300000008000400020000f5eeb4604b911f80df7400080001007063690014000200303030303a30303a31302e300000000008000300030000000800040001000000080001007063690014000200303000303a30303a31302e3000c3ce7c5a000300020000007500040003000000e9ea0d07a3a87170a3725cebf24b79105a72ed8877b84db6961869c5bde853a455f698b0bb3be6fcdee2f933ed9e032c6871485d58ac8be50e851a88e11cb70bc1d0d927917f757d17dcc192765134d8e78166a831ac1840bc6c0a29db14e44a6a97792913beac92979ebc7d362612db9d066664ece339c80e58a53d4f7c2853a0c1bd61c3ab82b1d02671e59dbb3ad99dc3a2775119ae8c3c8df35f35d53d86b36cf7b7f317ae4a99a3b04d8fab2764acb9d3d41550c7f95051ea07b55d186ea3df1fdfb4622b9561c8366b2dc94c7c174f4cc73ee200c34f0efd0dc51ed027f437c3ec1fc7087281bf0d370b37ccf7e521fcb39880984a2d34d3657648c9c06743e3e57af267d6a199bc857d24e7d72e7b41b360c98717602565bb3246d35e3a93dd082dfdb1349758c3d18b6344b142ff4a8c4b3add31156386127922692dd15236444c6307db60892f50cf1f985893b235a0a4cd8cb7c7d979b2f8595575936cf83b0197ba601449302a5aadef8b43359474a5f9282d63f09b0fc3c07dec8e03b6918b955a8463924bf9cdc62767b011ec0a2f77fa5d6155a6a47de5c81f21b8681f38bae900079f5c0fc9ff88f198530af30cc3d42e9c0792b19c5bbc"], 0x3}}, 0x80) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000240)=0xe1b0d1fb66878a2) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) lseek(r2, 0x0, 0x1) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r7}}, 0x20}}, 0x0) [ 974.170090][ T4800] FAT-fs (loop3): Can't find a valid FAT filesystem 22:18:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) pipe(&(0x7f00000004c0)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 22:18:19 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:19 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 974.623879][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 974.629769][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:18:20 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = syz_open_dev$dri(0x0, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x19, &(0x7f0000000140)={r4}, 0x8) r5 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r5}) r6 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r6, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) ioctl$SG_GET_SCSI_ID(r6, 0x2276, &(0x7f00000001c0)) ioctl$USBDEVFS_RELEASEINTERFACE(r5, 0x80045510, &(0x7f00000000c0)=0x2) perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffe9c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x80}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) r8 = getpgrp(0x0) setpriority(0x0, r8, 0xffff) migrate_pages(r8, 0xef8, &(0x7f0000000040)=0x7, &(0x7f0000000080)=0xeb) write$vhci(r7, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r7) [ 974.682814][ T4831] FAT-fs (loop3): bogus number of reserved sectors [ 974.704017][ T4831] FAT-fs (loop3): Can't find a valid FAT filesystem 22:18:20 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 974.752746][ T4832] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 974.773888][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 974.779719][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:18:20 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 974.807129][ T4832] EXT4-fs (loop4): orphan cleanup on readonly fs [ 974.835959][ T4832] EXT4-fs error (device loop4): ext4_orphan_get:1252: comm syz-executor.4: bad orphan inode 2 [ 974.885446][ T4832] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 975.070515][ T4849] FAT-fs (loop3): bogus number of reserved sectors 22:18:20 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed8, 0x80000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r0) [ 975.162511][ T4849] FAT-fs (loop3): Can't find a valid FAT filesystem 22:18:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f00000004c0)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 22:18:20 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x80040, 0x118) syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="9c00", @ANYRES16, @ANYBLOB="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"], 0x3}}, 0x80) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000240)=0xe1b0d1fb66878a2) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) lseek(r2, 0x0, 0x1) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r7}}, 0x20}}, 0x0) 22:18:20 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:20 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:21 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$dri(0x0, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r5 = getpgrp(r4) setpriority(0x0, r5, 0xffff) r6 = syz_open_procfs(r5, &(0x7f0000000040)='net/ip_vs_stats\x00') setsockopt$RXRPC_SECURITY_KEY(r6, 0x110, 0x1, &(0x7f0000000080)='\x00', 0x1) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r7, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r7) [ 975.681760][ T4871] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 975.755501][ T4871] EXT4-fs error (device loop4): ext4_fill_super:4489: inode #2: comm syz-executor.4: iget: root inode unallocated [ 975.793115][ T4877] FAT-fs (loop3): bogus number of reserved sectors [ 975.841834][ T4877] FAT-fs (loop3): Can't find a valid FAT filesystem [ 975.855334][ T4871] EXT4-fs (loop4): get root inode failed [ 975.904762][ T4871] EXT4-fs (loop4): mount failed 22:18:21 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB='(\x00', @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:21 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:21 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x10000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r0) 22:18:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f00000004c0)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 976.366873][ T4897] FAT-fs (loop3): bogus number of reserved sectors [ 976.377077][ T4907] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 976.412582][ T4897] FAT-fs (loop3): Can't find a valid FAT filesystem [ 976.451505][ T4907] EXT4-fs error (device loop4): ext4_fill_super:4489: inode #2: comm syz-executor.4: iget: root inode unallocated 22:18:22 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB='(\x00', @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 976.608477][ T4907] EXT4-fs (loop4): get root inode failed 22:18:22 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:22 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x80040, 0x118) syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="9c00", @ANYRES16, @ANYBLOB="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"], 0x3}}, 0x80) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000240)=0xe1b0d1fb66878a2) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) lseek(r2, 0x0, 0x1) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r7}}, 0x20}}, 0x0) 22:18:22 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r1, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000040)) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r0) [ 976.654130][ T4907] EXT4-fs (loop4): mount failed 22:18:22 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f00000004c0)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 976.979392][ T4924] FAT-fs (loop3): bogus number of reserved sectors [ 977.025760][ T4924] FAT-fs (loop3): Can't find a valid FAT filesystem 22:18:22 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB='(\x00', @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:22 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x1) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x8001, 0x81, 0x1, 0xffffffffffff0001}) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r1) 22:18:22 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x80040, 0x118) syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="9c00", @ANYRES16, @ANYBLOB="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"], 0x3}}, 0x80) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000240)=0xe1b0d1fb66878a2) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) lseek(r2, 0x0, 0x1) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r7}}, 0x20}}, 0x0) 22:18:22 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 977.337550][ T4937] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 977.406210][ T4937] EXT4-fs error (device loop4): ext4_fill_super:4489: inode #2: comm syz-executor.4: iget: root inode unallocated [ 977.481096][ T4937] EXT4-fs (loop4): get root inode failed [ 977.517438][ T4948] FAT-fs (loop3): invalid media value (0x00) [ 977.526031][ T4937] EXT4-fs (loop4): mount failed 22:18:23 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB='(\x00\x00', @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 977.564464][ T4948] FAT-fs (loop3): Can't find a valid FAT filesystem 22:18:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) pipe(&(0x7f00000004c0)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 22:18:23 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:23 executing program 2: r0 = pkey_alloc(0x0, 0x1) pkey_free(r0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) r1 = syz_open_dev$sndpcmc(0x0, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r2, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r3 = syz_open_dev$dri(0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x1, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r5 = dup(r4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r5}) getsockopt$llc_int(r5, 0x10c, 0x9, &(0x7f0000000040), &(0x7f0000000080)=0x4) close(r2) [ 978.016409][ T4968] FAT-fs (loop3): invalid media value (0x00) [ 978.064205][ T4968] FAT-fs (loop3): Can't find a valid FAT filesystem [ 978.149119][ T4970] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 22:18:23 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB='(\x00\x00', @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 978.215926][ T4970] EXT4-fs (loop4): orphan cleanup on readonly fs 22:18:23 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 978.269734][ T4970] EXT4-fs error (device loop4): ext4_orphan_get:1252: comm syz-executor.4: bad orphan inode 2 22:18:23 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$KVM_NMI(r1, 0xae9a) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r0) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) timer_create(0x5, &(0x7f0000000040)={0x0, 0x1d, 0x0, @tid=r2}, &(0x7f0000000080)) [ 978.370873][ T4970] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 978.500290][ T4990] FAT-fs (loop3): invalid media value (0x00) [ 978.548023][ T4990] FAT-fs (loop3): Can't find a valid FAT filesystem 22:18:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) pipe(&(0x7f00000004c0)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 22:18:24 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:24 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB='(\x00\x00', @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 978.926639][ T5007] FAT-fs (loop3): invalid media value (0x00) [ 978.941048][ T5007] FAT-fs (loop3): Can't find a valid FAT filesystem [ 979.131596][ T5014] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 979.193628][ T5014] EXT4-fs (loop4): orphan cleanup on readonly fs [ 979.236309][ T5014] EXT4-fs error (device loop4): ext4_orphan_get:1252: comm syz-executor.4: bad orphan inode 2 [ 979.267607][ T5014] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 981.382198][ T26] audit: type=1400 audit(1574115506.827:110): avc: denied { map } for pid=5027 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=16562 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 981.448363][ T5028] IPVS: ftp: loaded support on port[0] = 21 [ 981.529907][ T5028] chnl_net:caif_netlink_parms(): no params data found [ 981.567693][ T5028] bridge0: port 1(bridge_slave_0) entered blocking state [ 981.574981][ T5028] bridge0: port 1(bridge_slave_0) entered disabled state [ 981.582881][ T5028] device bridge_slave_0 entered promiscuous mode [ 981.591072][ T5028] bridge0: port 2(bridge_slave_1) entered blocking state [ 981.598335][ T5028] bridge0: port 2(bridge_slave_1) entered disabled state [ 981.606339][ T5028] device bridge_slave_1 entered promiscuous mode [ 981.628289][ T5028] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 981.640677][ T5028] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 981.692848][ T5028] team0: Port device team_slave_0 added [ 981.701308][ T5028] team0: Port device team_slave_1 added [ 981.757836][ T5028] device hsr_slave_0 entered promiscuous mode [ 981.824518][ T5028] device hsr_slave_1 entered promiscuous mode [ 981.874043][ T5028] debugfs: Directory 'hsr0' with parent '/' already present! [ 981.892553][ T5028] bridge0: port 2(bridge_slave_1) entered blocking state [ 981.899848][ T5028] bridge0: port 2(bridge_slave_1) entered forwarding state [ 981.907409][ T5028] bridge0: port 1(bridge_slave_0) entered blocking state [ 981.914535][ T5028] bridge0: port 1(bridge_slave_0) entered forwarding state [ 981.958491][ T5028] 8021q: adding VLAN 0 to HW filter on device bond0 [ 981.971801][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 981.981938][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 981.990860][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 981.999680][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 982.013360][ T5028] 8021q: adding VLAN 0 to HW filter on device team0 [ 982.026855][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 982.035788][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 982.042834][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 982.054586][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 982.062982][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 982.070092][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 982.096204][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 982.105776][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 982.114783][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 982.122957][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 982.132551][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 982.145783][ T5028] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 982.163713][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 982.172827][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 982.186518][ T5028] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 982.373939][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 982.379801][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 982.503922][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 982.509783][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 982.633952][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 982.639782][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:18:28 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x80040, 0x118) syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="9c00", @ANYRES16, @ANYBLOB="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"], 0x3}}, 0x80) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000240)=0xe1b0d1fb66878a2) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) lseek(r2, 0x0, 0x1) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d}, 0x20}}, 0x0) 22:18:28 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/mls\x00', 0x0, 0x0) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000600)=0x1, 0x4) sendto$rxrpc(r0, &(0x7f0000000680)="136cc0d1cf47bc63a14e730558b04714eddc0617fb7ecdc67d69849132838fe8ba6f8bde48df2cd06b68008dc6fb9a2182b69f7903ee8655f02cf9d8d1ff064d7c1e068a3442881ef2e527423e35b0d517e8f0214e268ba3c357081337b436963ae7e49aee780ca6c8f17a93a2d734b15e7e5ee2e465d3b86d1192236ed1f5357aa5f43634053b1966998882994fede18b056e40d2fa383dd6f75011d0355ed9a11d59aff7ef631e39604f10b59d298026e38d86ce112cd1ac9d5368e4b97b2c60", 0xfffffffffffffe3a, 0x10040801, &(0x7f0000000640)=@in4={0x21, 0x1, 0x2, 0x0, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x27}}}, 0xfffffffffffffd20) close(r1) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f00000001c0)={"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"}) 22:18:28 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) pipe(&(0x7f00000004c0)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 22:18:28 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}}, 0x0) 22:18:28 executing program 1: unshare(0x20020000) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f00000001c0)={0x401, 0x0, 0x10001}) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000280)={0x7fffffff, r2}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) r3 = socket$inet6(0xa, 0x0, 0x0) fdatasync(r3) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0xebd060a4fbea1c1a) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r4, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) accept$inet(r4, 0x0, &(0x7f00000002c0)) r5 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000240)={0x5, 0x1, 0x7, 0x8, 0x20}, 0x1) getpeername(r5, &(0x7f0000000380)=@alg, &(0x7f0000000100)=0x420) r6 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f0000000240)={0x5, 0x1, 0x7, 0x8, 0x20}, 0x1) r7 = socket$inet_udp(0x2, 0x2, 0x0) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r10, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r9, 0x2405, r10) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000003740)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) ioctl$SIOCX25SFACILITIES(r6, 0x89e3, &(0x7f0000000000)={0x6b, 0x0, 0x4, 0xa, 0x6, 0x102}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 983.134014][ T5041] FAT-fs (loop3): invalid media value (0x00) [ 983.188182][ T5041] FAT-fs (loop3): Can't find a valid FAT filesystem 22:18:28 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}}, 0x0) [ 983.235289][ T5052] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 983.313491][ T5052] EXT4-fs (loop4): orphan cleanup on readonly fs [ 983.343703][ T5052] EXT4-fs error (device loop4): ext4_orphan_get:1252: comm syz-executor.4: bad orphan inode 2 22:18:28 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 983.393324][ T5052] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:18:28 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x101, 0x260802) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0xb8, 0x25, 0x400, 0x70bd2c, 0x25dfdbfe, {0x8}, [@typed={0x4, 0x6f}, @generic="9f6609d010337fd74614cbb635cc159423b9cac7ec4d613abe706a62d0eea8f575e79125666d15ecd9d275c51c566d42a409312bba31ec622ab8e850c97def418528fa0bd8e2770fbcc88067054fcaabefc41d54a0aae48da61d2b316d0b82caff76717b74f0aa034e80dda2c785d99e445c7f5f43687641fcd45fb13770dfa303190ca4f3b50a7f95cfa39a0c601e412c278152d0c5f8e567fe1c6b580db7"]}, 0xb8}, 0x1, 0x0, 0x0, 0x40}, 0x0) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0xfdee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x101}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r2, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r2) r3 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_REGISTER(r3, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) ioctl$BLKIOMIN(r3, 0x1278, &(0x7f0000000280)) 22:18:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) pipe(&(0x7f00000004c0)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 983.631575][ T5078] FAT-fs (loop3): invalid media value (0x00) [ 983.649886][ T5078] FAT-fs (loop3): Can't find a valid FAT filesystem 22:18:29 executing program 0: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x80000001, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x9c0be) pipe(0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="55c39f96937a23ce3d476b508e30f50eea0d4cc979f1621bf576ac043f2cf03ca4600671a9f1206a323058df36a1d5be66a3f045e8b715b9895d4ba8551aea31a41254773bee2ce26a425633bfc979f163030ec10d9d3c2e11c6ceade5c65aca0872a1e0b61772b614a0cb50d6fa005946b77a7b3cc5de50eb6a18b04806be687ac01e09a32962acde7e0f8dd02d912055fa92b2ebe8b1c0f2a9ea145f3d0bc9825ae6062f1ae2d88b73c9a063fd0c5c8d21e88eab3bb4df5480b80b50b88b902790d8974f", 0xc5, 0x2}], 0x88000, &(0x7f0000000400)={[{@barrier='barrier'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '%}em0md5sum^'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/selinux/mls\x00'}}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}}, 0x0) 22:18:29 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7", 0x15}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 983.976385][ T5098] FAT-fs (loop3): invalid media value (0x00) [ 983.984893][ T5098] FAT-fs (loop3): Can't find a valid FAT filesystem 22:18:29 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x80040, 0x118) syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="9c00", @ANYRES16, @ANYBLOB="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"], 0x3}}, 0x80) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000240)=0xe1b0d1fb66878a2) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) lseek(r2, 0x0, 0x1) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d}, 0x20}}, 0x0) 22:18:29 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L-', 0xffff}, 0x28, 0x6) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r0) 22:18:29 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7", 0x15}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:29 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x686987548330b3, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x3) connect$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e21, @remote}, 0x10) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000640)={0x0, {{0x2, 0x0, @multicast1}}}, 0x108) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) preadv(r3, 0x0, 0x0, 0x0) r4 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r4, &(0x7f00000000c0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) listen(r4, 0x9) r5 = socket$netlink(0x10, 0x3, 0x0) dup3(r5, 0xffffffffffffffff, 0x0) socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(0xffffffffffffffff, &(0x7f00000000c0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) listen(0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) getpid() ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) 22:18:29 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000080)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x1f, 0x1, &(0x7f0000000100)=[{&(0x7f00000005c0)="f0500e39b151732a6825dec04fb51175b42a66c4739a65691be83aa2a13eae4cf1da09a27c1716505b373abdfe1c8d21731d4c61cf8bd2099e475f4e44ea6a9b146659c0ddc290eb69fbde9e7d81c87f9f71fdc49459a6bde53089fc27177a6a5e28090ad55c5a86304cb94cbb4cc7491ee66c0b815afbb91e6766da5f2f2e65d88f788a4d529ad8c0b81414bbac545d5fc52e32f616cc1e824b2703b03cc7b3921df65617c2cb99340c660340659f7e58eeb59e3570bdf3720d594d1bea7c293a07303a811394a6acbc1765d01f378c5f5ccd3adec1338f8fac5ae085679fc01d76af82ebebc36fabe1d3e881deec6dfb59dbe3b9fad75ce9fdbdb4cc52f463a68b9f995043a218f52e38d4b32bbb53ba24521d753181db979956f87698dd6f3932f4742e3aea766eb70c71d8355bf417e0e8ffa1b82894510efba032280c0ca6d015cc1129fd48e3ab3fc0c190dae0b3264099b1cce864342e9bb0b48caa35b78eaf89ad5a84e1de16965f04806461445d5a6002e0eaff8a93719b69d7d66418865d09e8b12812f9d02c81b28968a403fcf4961fb532402a697ae81ea47b031ffc2bdc606759a057ad5fa207651898b6b3886ed2c2b082d70693e2d37de056cbbe848617d4c2b69c7d31a87d22201a2c08e17c2c8bfcf13b49b52639e751cc7c6abf2ab2287cee1d6d3260ec4fb0002658bb7431463ccafade48ad9ddcd20df2c7d95126500308bf5e427839cc85ae011cbfebb5fe9536b389fb11770791b5f0e96ee4452caec250bf0cef3b2d2b7cc85113fcb6da5db4ef6af951b86e5c05261ddc56bc67dde98d01e0e02035c2b6502004c1ecec26847325d90b549861ca31c15ff2ea24f7508a12efea66c5015f601e53232312c3a0c918b9379eb2cd553c4dffd67718314536c5506fb7f6f94a8265e82c94babbc759581e706b1d247d0a5dbcd259afa09b3b0807f769e7231a751cc1bf3607253fd1e1a987ba81d077c1c0bd5ecb2d49e0cf91534f2f9bc6fe3c37ca06e0138ee11d025890d8ab87f8aaa4922ecfc663bdaa505e70d38d44b091aa9cb5417f46fe3a4470e39cb303421d1dafd236fce070d761e188133c5a2bfca7650fc1e443751619ab5e63b6f5c0b6325740fe4aa542f2cbefcb30ae94f012bd244ca579bc3d6faa9f9156dbee48f377d3ffe8794a0995c2527a2fa4dc585e0201955093c4c7e74ab6ac3214996842efb954048f051cb3abf98d360fec1bee84ded4246c008fe9e10b668244353b915593815e0d893257d58a916dfaa7e435244da08ea0ad825431658298c4039f1b9831fa5592039f729919e00046fdd8a34af66e9e4114d5cad7b9bc83141ddba825a66f1abae803556741ad081ee315d41b20c03fb62cd473412cbc2605ffde859941b2b7092587b14a840a19414f8bf49f3bb2e401078e2624397c144e9163adbd87fd1d9a209dab99e67849b54bbaf5a68c8295e67fb8766a43b505f39325ea812e7de4849ae0f347c2298083d121c898ae84cbfb3ce08ba7f128b2817b105bd1e8d7752168d9aba10b8be106db15a1aeec0446254445e7de70ef5602b2ce1f385327e5549b83252ac3ef78b8c39a8501db6f529ac5b8a5aebc7194c7c5dc055d682401d22e504ef6d04793aec0fd8ca552495cbbc1789c51274200caffce02127b09086c893a84341286b85a7a53bf20591ee67c1776c44ca46d7862102e99033de09395919fe8b9c1208185737dfafb48c982dd5bb21c0e9edf60d5741f62d3f298d870fc639ac3b0e4b31f5082436ec6d66d72d07ee0d0baf0283ebe5ae8b1719462859c42962e1ca364386806806f7dbd0442d9f17f5520a0fa1a2d0d7ab30457afdfc74e49c9b97250cbf2cf5db4870f907266b7e24bd79ad5087c7bc65bc67e4a2fb8e631e917c5b6f7320cbaf7872957bb20a21d1c85a83fe549f9325180230127951ba6c966832cb12daf768548150c29cab19dd18826a56d787acddc41d9b9f7dcb783957aed1f29b7d7992aaa0e9ebd0f9dfbee88272282f7b3755fa43ac3a6c4573beecc56e7dc225ed003a7cc9dcd3471853ae1459a51c3bc4379745eaeeb98ca21bed9da7c647effb378d7614c93257b80f31f4465b6c004d38e7da7d70b0fb387a6a00cd908baaa43b074813886f35194004648a8b6bf6b1b75681c6870114318f9b0bb36251662a5de1f10d6775a661950ea9fb78113112c26de9778ec462f58c00328bfdd2f01299b73430edcb33a907686e07850aa78699e673f19b6fa17016755f0db2593701a020daa7f52bddf0b6a662c13475bdfca41f5a4c37759cc3b0394ce5e8b9f3f9fbed3160a80df0c85e97e6c77bfd71731a4032d99a609bdf85ffb09aa768f40127c600dd5f5d8685f75be2d6f9a3a12a981011f300696bb3f077a692efe9798626264eb5f07ebac36abde23599aaa4297232b8d203951599b48295afd5eec48bd1ee8c7f873a33e79de2f6da24141835c1c9dd9337be47371513ab3f325b44ca925d7d9629984ac04afe9a1d6d9d6bcbcbfba7dedc2c07785a786ffa3220a7f8b75944e9980e7d68fbc66281e4654b065e2bfb2a667164220db706c252aff0d0d75f06074d39f633df79f63fe34fc92d51b334cb40a3f4dfe405a3900c8d3eee63074d4b1e934dbe7bc577e2f99807c228c96702f1b94540d270dca647c4edc4e47fef9e79c68d8215ca48ee88b981af2a41683f5d1cf28d53f5ccf38698f34ccb9b3949fff5eec08d0f9d01126f2569bd8faab3c8ddc0a51763a7425a1a7f40a30ab58db50a8b3d7c5b0b94e77f7c9e9e2856512f52291759d2f0bd4864921c7df3837b6ebebee2b246fcfc875d8b925fef8a2bfd52b27d3f3cb4f975a18dbad072a3b964319e062f9785d35ead929ac4e5f9b7f26f0bf9ad005d07ef837a6c0648b574a213346b167ec205167df4df800d34239324a08956897e28d9c4608283d440c46cbe396364020d523e52fd29b8a1cc76b8486260ade03796bb8de4042499c6cd2a75bd44e458902f0bf34ee644e4ddd45c32d4dd497788da345fb265b419c6ce78a82aea5f8c7c54c778e7a022dde77e62dcbc1992485636b188dc1b565e8245fa80c5f9f5b20d41fe3e1f8d333f9cc4a9a1760535ec1d4f6a5970c58a98379fdfa6ce874b7a34ebb8081723600d56ecf351ce4b76b930e44eeb79788bdf88fe6f101a87bf409a6caab9e7bc5cb0dd2dec0a8e34d262d1a4558b6ea36850bcd98983d8a9c91203bead16dc25daf265a412dfe58e8dc63a65ccd823b8b1039bfa36bd3276b78f35f6a293acecaebf1ab909b7bcf8fdbc1e97e3db09d6ce1c8ccb6dd71c3e6c4d63a24cf20a324c51677872b3f55e770f413fbd732d8f773637e60ef308ad5f380da5242759bfffcc78a2f921fe17bd4442d25fa3ec063f99de65d2c99bd0a3bc096d4f8f561081af443d4fdcca38a1565ecef4c859ceff38d534a859109b93988839768aa62dce9b19c2f9ff60aa0f995209df2d2c7294807aab67f75ff1daadcf06e7621b999ef1ab395924f7a0f828207ca095cd0b935f9bc0b380e3e405bfa7c9adc08a93b9e40ee61b61ad6e8d7c3420f5adf6a35795fadd23dadb0b447f73f4037ae51c33031485a75a28e01d60645dc92c678f2080702abeae1d51d9895b21e54976c1e11764cb5c6fd48c49a83c7e6b44a02ae0223a8967b89a6f3feaa8a5f57f7d59c648387a2e10445b6b2146e943daacdaa4e00adbba00ba14e60ce2afdd501de27570fe3a551afcb5bdbc3fed289e835ff8a5411ac62d9d14967f59595044837c1363bd619a8352f26a21d4e331b001e9e4d273b0eb79402e3aaeb88d21e1f21260cbaf9d8d1ac9be8bcb2f43c76a8ecac795584448b7444502afb85e0d2e0371676254d6ee3cc4a96963880366a9c7cfb365c013d1841f473d747cf7f59835ffd98ace0ead6f9a763c6bf6595279ebd0f23c3a0966d16b93208abe326f153b29d2e45aa47e99e000f751bede4d84407fb46aa2e43c75d1746a424c1c65e04fd78c776d737c8ce9841b1a7daa0d5eb1f2917a15d3db66e783dce414e72842f10cebbd502693f5fd7cd2019f0e215412d5ba8321c20df6ba1d6d7edff3f02ff077dd0a942dab9f9f37db2072bf780118dee6017b24e78781a444e3b2d270d58b221f136e5ac273268ac0b5174d345a1b4188903f2b48a6b1cf3fcdc421d53be24e4b4c4ae664d0d7c73d7bde76004f717948a8a1ae8085c828e68960436b111a8e973038417636def19955821801e924430b35d837a08a1d685572c0d782ccba597f07931ff0abbcb0ad8c4371b04f573528aebf7657be0b2e0eb4957ce3f8a7ba7c1c0f3408d78b7b3c82849d6f8b97cfaa5d9fc29bde8bbabeb668a640692def615fa3fc192426d99c9abefca222ebe337184820f45060ff43b2e41b7a87f27be6a050214588d574f011051a952ee65892e68a73f16f0141ec45f59289167055e8cf08d91c26e6c78dc1dca91067af11084d2552cbc8f178b1364257f8eed309e65accc784bc13cb5c81621e1721007b54599cd6136ce25675795b0cbcb1b3d199b11a5d3b9cf22cf086b717fc7216873e4627f4f72ee5bdc4201bbbd61e21e6ea46d306b98d4b75e5167698e1ee711333d84afe7f034b6570e2bed26c955537b6c8a772caf37c778a3a55f28794a69f2be2b88e8940c9f75f66196563b251c7f0c83c3c81117c86f93df85cd762c36f4fc45047fb4d2c9e2af4e081bb630cff320f347e0f6077f51e46c9cf401828d14531737580286b544e0992a494e822b56df526e5809ec69d5b4a1c36955668e4b820a9c702a12c05ffbe43742fc058c93ced8b091dd17ff8939b244326d98624b08bb3354eed9b5119c9ee3299603f2b9865c0a1dfa54d1c833ed05fb6bae164840c2ea83e7c3fe0af61789a51182dec38a47020dc10d9b46804877c50df977e54cb731853f5ba6f9bd07aa737ecf9e391d273d3948656c0ee36df93bceefd17f8656bca9e4b21806997f8e77e7d10902692331d71959e1c2a883fe32c77e6edd7e5e3f0197cb2bc455e5c2b3e79e2e1eb76d92d5f610807633ddc29a4d52baa70a276ccc2494a53106981537df1f15aaf8815c68eca4eb5e3ad0ce27adfb618350a46d5081cd8cd77ef2e5c8bfa71a7d8e84174213ce918e0918b42f3fc1d4b641d7b7ea39bccd541f0b6f02f3d00d500b754a2ae9e2c5888844ba2ffc7800326dca026d7a99c2ebefc3174ac44b8f7846487dc6965b737fbc8c6806575436643d086c4f230a490cf774a4ae7a926d814e42d643103e13ff1b48c0dc94760b0c2c328718fdd52b60a5da70082c125704d6d949f4f3acd383168799b1ee70df230b7253f9c95ff17f7309ed8828ff8d372c53ce076a2068e01cba610087ef874e9c378467a53fc03857584eca4e05970aee2432f8d1ba9a332fc6658ad44f11138037bc04c452edc278ee9b247d6cc05e143a9304a0dbf2f7987027341ef152532fa7694d9ca3fcfa8a27f6977d0176cd0dc7d01c874846307cde1b5e12289ad8a9166dab4fb24387f09f6ef0545b41e13a059fc901022c6034a5d8e62f2ac50a950ff4fffcb2c475d691607160cc6b2025b4abf875faeaa7588cb818cc5160e28f7ea0804d4ca05418e7d6b78883aa16b6ac61763c8de0fdaebbddfa1508ddef8bebb30156d09e0fe4528abce1210adae5dcc36430fd5f6512ea0cdea08f5e60c00a2e37cda9bd7021fab02fb4e02a667f158f4e4d9a28246d790459373f47cdf917d6b5cb692b5ff8a660728265b2", 0x1000, 0x8}], 0x800, &(0x7f00000017c0)=ANY=[@ANYBLOB='uid=\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB="2c6d6f64653d307830303030341e01888bc1417a303030352c757466382c636865636b3d72656c617865642c7569643de685e10a6c246b7731eaea0f9290ddf9a24e836582911573a9816d20d793ccd4c5ceed999f2d37d513bce48593f14cb8c5702ff99feec635301762aaf3dfa0f7b90036280ea8d5d5f0fe63338d9e601633f46f2e7cd142b7002b5a7ec36ad22f109676804d7c13146fe5d8861b8aed7349deffff8234e0ee9346dab6fb497b4c7d12299ee6929b6748", @ANYRESHEX=r2, @ANYBLOB=',fowner>', @ANYRESDEC=r4, @ANYBLOB="2c7375626a5f757365723d646576707473007668d27021730a4068612ec18805891d08b3586492591b8cc0d0f495328c214a43d15d556ca280198820d4620f878950b44df75d77a9b6c37d160c8775656724d92c8c9bbb2afe95b8a19a5641b73377df2fa9c58ee1efc58d1638ba22838be2f72afad2306194c7796946070b14d2c17a949d9d072aabead94565aca23870a2a19a3bb46fa0f1d7265b32f282bcc27475fbf5b159d6a91bbe63de418d945729932cac0286d10d00ef5af35984db46f275a18b5f9f65fe5b71b15cce6e084320812c646f6e745f686173682c00"]) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') [ 984.408482][ T5112] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 984.630252][ T5120] FAT-fs (loop3): invalid media value (0x00) [ 984.652550][ T5112] EXT4-fs (loop4): orphan cleanup on readonly fs [ 984.664163][ T5120] FAT-fs (loop3): Can't find a valid FAT filesystem 22:18:30 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x80040, 0x118) syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="9c00", @ANYRES16, @ANYBLOB="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"], 0x3}}, 0x80) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000240)=0xe1b0d1fb66878a2) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) lseek(r2, 0x0, 0x1) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d}, 0x20}}, 0x0) [ 984.676651][ T5112] EXT4-fs error (device loop4): ext4_orphan_get:1252: comm syz-executor.4: bad orphan inode 2 [ 984.744224][ T5112] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:18:30 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7", 0x15}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:30 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x10000, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r0) 22:18:30 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) pipe(&(0x7f00000004c0)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 22:18:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) pipe(&(0x7f00000004c0)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 22:18:30 executing program 1: socket$inet(0x10, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x0) close(0xffffffffffffffff) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000240)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000240)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) pipe(&(0x7f0000000280)={0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r3, 0x0, r5, 0x0, 0x100000800ffe0, 0x0) splice(r3, 0x0, r4, 0x0, 0x100000000000a, 0x2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8}, 0x4) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) [ 985.220066][ T5155] FAT-fs (loop3): invalid media value (0x00) [ 985.303392][ T5155] FAT-fs (loop3): Can't find a valid FAT filesystem [ 985.417856][ T5172] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 22:18:30 executing program 0: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x193, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 22:18:30 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 985.511393][ T5172] EXT4-fs (loop4): orphan cleanup on readonly fs [ 985.540871][ T5172] EXT4-fs error (device loop4): ext4_orphan_get:1252: comm syz-executor.4: bad orphan inode 2 [ 985.594410][ T5172] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:18:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) pipe(&(0x7f00000004c0)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 985.813869][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 985.819983][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 985.827280][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 985.833074][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:18:31 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000040)={r0}, 0xd) 22:18:31 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:31 executing program 0: [ 986.102233][ T5203] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 986.174876][ T5203] EXT4-fs (loop4): orphan cleanup on readonly fs [ 986.210723][ T5203] EXT4-fs error (device loop4): ext4_orphan_get:1252: comm syz-executor.4: bad orphan inode 2 [ 986.244805][ T5203] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 987.734974][ T9671] device bridge_slave_1 left promiscuous mode [ 987.744036][ T9671] bridge0: port 2(bridge_slave_1) entered disabled state [ 987.794870][ T9671] device bridge_slave_0 left promiscuous mode [ 987.801164][ T9671] bridge0: port 1(bridge_slave_0) entered disabled state [ 988.034473][ T9671] device hsr_slave_0 left promiscuous mode [ 988.074015][ T9671] device hsr_slave_1 left promiscuous mode [ 988.155113][ T9671] team0 (unregistering): Port device team_slave_1 removed [ 988.194693][ T9671] team0 (unregistering): Port device team_slave_0 removed [ 988.232840][ T9671] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 988.305608][ T9671] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 988.490914][ T9671] bond0 (unregistering): Released all slaves [ 988.667727][ T5226] IPVS: ftp: loaded support on port[0] = 21 [ 988.852259][ T5226] chnl_net:caif_netlink_parms(): no params data found [ 988.899923][ T5226] bridge0: port 1(bridge_slave_0) entered blocking state [ 988.908220][ T5226] bridge0: port 1(bridge_slave_0) entered disabled state [ 988.916969][ T5226] device bridge_slave_0 entered promiscuous mode [ 988.931795][ T5226] bridge0: port 2(bridge_slave_1) entered blocking state [ 988.941622][ T5226] bridge0: port 2(bridge_slave_1) entered disabled state [ 988.950294][ T5226] device bridge_slave_1 entered promiscuous mode [ 988.981918][ T5226] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 988.995016][ T5226] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 989.027460][ T5226] team0: Port device team_slave_0 added [ 989.036075][ T5226] team0: Port device team_slave_1 added [ 989.107562][ T5226] device hsr_slave_0 entered promiscuous mode [ 989.164306][ T5226] device hsr_slave_1 entered promiscuous mode [ 989.203919][ T5226] debugfs: Directory 'hsr0' with parent '/' already present! [ 989.240145][ T5226] bridge0: port 2(bridge_slave_1) entered blocking state [ 989.247477][ T5226] bridge0: port 2(bridge_slave_1) entered forwarding state [ 989.255207][ T5226] bridge0: port 1(bridge_slave_0) entered blocking state [ 989.262312][ T5226] bridge0: port 1(bridge_slave_0) entered forwarding state [ 989.377387][ T5226] 8021q: adding VLAN 0 to HW filter on device bond0 [ 989.413668][ T4651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 989.435658][ T4651] bridge0: port 1(bridge_slave_0) entered disabled state [ 989.445184][ T4651] bridge0: port 2(bridge_slave_1) entered disabled state [ 989.488700][ T5226] 8021q: adding VLAN 0 to HW filter on device team0 [ 989.519808][ T4651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 989.530253][ T4651] bridge0: port 1(bridge_slave_0) entered blocking state [ 989.537964][ T4651] bridge0: port 1(bridge_slave_0) entered forwarding state [ 989.547006][ T4651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 989.555882][ T4651] bridge0: port 2(bridge_slave_1) entered blocking state [ 989.562963][ T4651] bridge0: port 2(bridge_slave_1) entered forwarding state [ 989.612084][ T4647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 989.635308][ T4647] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 989.669116][ T4647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 989.696532][ T5226] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 989.724104][ T5226] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 989.748199][T23612] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 989.757653][T23612] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 989.810165][ T4647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 989.820281][ T4647] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 989.832442][ T4647] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 989.851264][ T5226] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 990.193893][ C0] net_ratelimit: 6 callbacks suppressed [ 990.193900][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 990.205466][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:18:35 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x80040, 0x118) syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="9c00", @ANYRES16, @ANYBLOB="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"], 0x3}}, 0x80) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000240)=0xe1b0d1fb66878a2) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) lseek(r2, 0x0, 0x1) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) 22:18:35 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:35 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) pipe(&(0x7f00000004c0)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 22:18:35 executing program 0: 22:18:35 executing program 1: 22:18:35 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000040)={0x0, 0x0, 0x20}) r3 = syz_open_dev$dri(0x0, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r6 = dup(r5) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r6}) r7 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r7, 0xc00c642e, &(0x7f00000000c0)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f0000000080)={0x0, 0xc0000, r7}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f00000000c0)={r2, r8, 0x6}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800, 0x101}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r9, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r9) 22:18:35 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) socket$caif_seqpacket(0x25, 0x5, 0x3) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000640)={0x0, {{0x2, 0x0, @multicast1}}}, 0x108) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) gettid() r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) preadv(r3, 0x0, 0x0, 0x0) r4 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r4, &(0x7f00000000c0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) listen(r4, 0x9) r5 = socket$netlink(0x10, 0x3, 0x0) dup3(r5, r4, 0x0) r6 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r6, &(0x7f00000000c0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) r7 = socket$netlink(0x10, 0x3, 0x0) dup3(r7, r6, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r8 = getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f00000000c0)={0x0, 0x0, 0xc}) ioctl$DRM_IOCTL_GEM_CLOSE(r1, 0x40086409, &(0x7f0000000100)={r9}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) close(0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 22:18:36 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(0xffffffffffffffff, 0x9204, 0x9c0be) pipe(0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 990.634381][ T5247] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 990.736065][ T5247] EXT4-fs (loop4): orphan cleanup on readonly fs [ 990.757119][ T5247] EXT4-fs error (device loop4): ext4_orphan_get:1252: comm syz-executor.4: bad orphan inode 2 22:18:36 executing program 2: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f00000000c0)={0x18, 0x8c, &(0x7f00000001c0)="96d0ad590909b48d7f16cbbdd0d1dc1901bc8110fe463186c1c07a556da8fd2b981dbdbfa171dbad790729bf338704b832427b6d9f1eb9f8980f96b0d9a1ca3717ff58dfdfdb95e9eca635518bbb0eafc940cf5cd81cf02ef7c45ffc2a95544fab98e463f3bd0ed5224dd0ae9093315fb6c136c7e837c863341e55056017dd1dc4e7e2ee4b29277dfb151880"}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$TUNGETIFF(r3, 0x800454d2, &(0x7f0000000140)) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r4, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r5 = semget$private(0x0, 0x2000000010a, 0x0) semctl$GETALL(r5, 0x0, 0xd, &(0x7f0000000000)=""/141) semctl$SEM_STAT(r5, 0x0, 0x12, &(0x7f0000000040)=""/117) close(r4) [ 990.836761][ T5247] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:18:36 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(0xffffffffffffffff, 0x9204, 0x9c0be) pipe(0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:36 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) pipe(&(0x7f00000004c0)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 22:18:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$KDMKTONE(r1, 0x4b30, 0x7fff) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$TIOCSSERIAL(r2, 0x541f, &(0x7f0000000080)={0x7, 0x2c, 0x8, 0x7fff, 0x2, 0x3ff, 0x4c, 0x8001, 0xff, 0x7, 0xdd, 0x3, 0x200, 0x5, &(0x7f0000000040)=""/41, 0x16f, 0x65f09f5c, 0x233}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r3, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r3) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x32901, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r4, 0x4c09, 0x8) 22:18:37 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x80040, 0x118) syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="9c00", @ANYRES16, @ANYBLOB="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"], 0x3}}, 0x80) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000240)=0xe1b0d1fb66878a2) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) lseek(r2, 0x0, 0x1) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) 22:18:37 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(0xffffffffffffffff, 0x9204, 0x9c0be) pipe(0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0xfffffffc) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2, r3}) 22:18:37 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0xfffffffffffffffe, 0x711000) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000400)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r0}) r2 = add_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000001c0)="a48fb8504ffbd8417bc47fef2aab326abc0b1885c455f29957446b5363598b8546f60a7b14cc81413877b66fa0dac961979b7fcda2ad5e4662a06a8d408c682c688faa518495751919288c8996bee351a76b0349edfd7a2763cf33369e3be456dfd63daed28269ff6f771112816b43ccc0c8335518dca212a651675ce272a62c65530050fc83", 0x86, r1) r3 = getegid() keyctl$chown(0x4, r2, 0xee00, r3) syz_open_dev$sndpcmc(0x0, 0x7, 0x76243) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r4, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r4) [ 991.919735][ T5291] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 992.070314][ T5291] EXT4-fs (loop4): orphan cleanup on readonly fs [ 992.111538][ T5291] EXT4-fs error (device loop4): ext4_orphan_get:1252: comm syz-executor.4: bad orphan inode 2 [ 992.181830][ T5291] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 993.472426][ T5315] IPVS: ftp: loaded support on port[0] = 21 [ 993.554591][ T5315] chnl_net:caif_netlink_parms(): no params data found [ 993.586123][ T5315] bridge0: port 1(bridge_slave_0) entered blocking state [ 993.593254][ T5315] bridge0: port 1(bridge_slave_0) entered disabled state [ 993.601968][ T5315] device bridge_slave_0 entered promiscuous mode [ 993.610123][ T5315] bridge0: port 2(bridge_slave_1) entered blocking state [ 993.617679][ T5315] bridge0: port 2(bridge_slave_1) entered disabled state [ 993.627819][ T5315] device bridge_slave_1 entered promiscuous mode [ 993.649985][ T5315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 993.662943][ T5315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 993.686080][ T5315] team0: Port device team_slave_0 added [ 993.694398][ T5315] team0: Port device team_slave_1 added [ 993.746270][ T5315] device hsr_slave_0 entered promiscuous mode [ 993.794464][ T5315] device hsr_slave_1 entered promiscuous mode [ 993.833968][ T5315] debugfs: Directory 'hsr0' with parent '/' already present! [ 993.853733][ T5315] bridge0: port 2(bridge_slave_1) entered blocking state [ 993.860857][ T5315] bridge0: port 2(bridge_slave_1) entered forwarding state [ 993.868246][ T5315] bridge0: port 1(bridge_slave_0) entered blocking state [ 993.875378][ T5315] bridge0: port 1(bridge_slave_0) entered forwarding state [ 993.923289][ T5315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 993.939631][T24073] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 993.951399][T24073] bridge0: port 1(bridge_slave_0) entered disabled state [ 993.960208][T24073] bridge0: port 2(bridge_slave_1) entered disabled state [ 993.969575][T24073] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 993.984580][ T5315] 8021q: adding VLAN 0 to HW filter on device team0 [ 993.998639][ T4647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 994.007229][ T4647] bridge0: port 1(bridge_slave_0) entered blocking state [ 994.014373][ T4647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 994.030533][T23612] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 994.040953][T23612] bridge0: port 2(bridge_slave_1) entered blocking state [ 994.049135][T23612] bridge0: port 2(bridge_slave_1) entered forwarding state [ 994.070320][T24073] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 994.079444][T24073] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 994.092516][ T4647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 994.114357][ T4647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 994.122907][ T4647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 994.140887][ T5315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 994.160664][T24073] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 994.168860][T24073] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 994.181701][ T5315] 8021q: adding VLAN 0 to HW filter on device batadv0 22:18:39 executing program 1: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 22:18:39 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x80040, 0x118) syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="9c00", @ANYRES16, @ANYBLOB="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"], 0x3}}, 0x80) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000240)=0xe1b0d1fb66878a2) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) lseek(r2, 0x0, 0x1) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) 22:18:39 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) pipe(&(0x7f00000004c0)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 22:18:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r2, 0x400455c8, 0x100000001) 22:18:39 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x0) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:39 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0xc4) getresuid(&(0x7f0000000080)=0x0, &(0x7f0000000140), &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)=0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000002c0)=0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r10) r11 = getegid() keyctl$chown(0x4, 0x0, 0x0, r11) setfsgid(r11) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0xa1ae02d8de2d272e}, [{0x2, 0x4, r1}, {0x2, 0x4, r3}, {0x2, 0x1, r4}, {0x2, 0x1, r5}, {0x2, 0x3, r7}, {0x2, 0x6, r8}, {0x2, 0x0, r10}], {0x4, 0x1}, [{0x8, 0x5, r11}, {0x8, 0x2, r12}], {0x10, 0x2}, {0x20, 0x1}}, 0x6c, 0x1) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r13 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, &(0x7f0000000700)={0x855, 0x2, 0x5}) socket$inet6_tcp(0xa, 0x1, 0x0) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r13) 22:18:40 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x7}, 0x5e022, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) r2 = syz_open_dev$dri(0x0, 0x0, 0x0) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r5 = dup(r4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r5}) r6 = dup3(r5, r0, 0x40000) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000140)={0x6, 0x2}) ioctl$SG_SET_DEBUG(r6, 0x227e, &(0x7f0000000040)=0x1) write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r1) [ 994.582927][ T5336] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 994.642138][ T5336] EXT4-fs (loop4): orphan cleanup on readonly fs 22:18:40 executing program 1: syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0xfffffffffffffe3f) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000440)=0x4018) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYRES16=0x0, @ANYBLOB="16549b453c7b1f"], 0x2}}, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 22:18:40 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x0) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 994.695808][ T5336] EXT4-fs error (device loop4): ext4_orphan_get:1252: comm syz-executor.4: bad orphan inode 2 [ 994.775479][ T5336] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:18:40 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) pipe(&(0x7f00000004c0)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 22:18:40 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x0) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:40 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0xe2, 0x0, 0x7f, 0x100, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x8795, 0x4}, 0x10000, 0x0, 0x40, 0x0, 0xffff, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r0) 22:18:40 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="7de5962a2f7d40d4b75c60f5", @ANYPTR]], 0x1}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) [ 995.365897][ T5374] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 995.469488][ T5374] EXT4-fs (loop4): orphan cleanup on readonly fs [ 995.497759][ T5374] EXT4-fs error (device loop4): ext4_orphan_get:1252: comm syz-executor.4: bad orphan inode 2 [ 995.577263][ T5374] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 996.455246][ T5282] Bluetooth: hci0: command 0x1003 tx timeout [ 996.462324][T24634] Bluetooth: hci0: sending frame failed (-49) [ 997.112975][ T5401] IPVS: ftp: loaded support on port[0] = 21 [ 997.198456][ T5401] chnl_net:caif_netlink_parms(): no params data found [ 997.232036][ T5401] bridge0: port 1(bridge_slave_0) entered blocking state [ 997.240396][ T5401] bridge0: port 1(bridge_slave_0) entered disabled state [ 997.249063][ T5401] device bridge_slave_0 entered promiscuous mode [ 997.259533][ T5401] bridge0: port 2(bridge_slave_1) entered blocking state [ 997.266811][ T5401] bridge0: port 2(bridge_slave_1) entered disabled state [ 997.276254][ T5401] device bridge_slave_1 entered promiscuous mode [ 997.295664][ T5401] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 997.308749][ T5401] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 997.748609][ T5401] team0: Port device team_slave_0 added [ 997.758802][ T5401] team0: Port device team_slave_1 added [ 997.837800][ T5401] device hsr_slave_0 entered promiscuous mode [ 997.899235][ T5401] device hsr_slave_1 entered promiscuous mode [ 997.954096][ T5401] debugfs: Directory 'hsr0' with parent '/' already present! [ 997.975791][ T5401] bridge0: port 2(bridge_slave_1) entered blocking state [ 997.982986][ T5401] bridge0: port 2(bridge_slave_1) entered forwarding state [ 997.990422][ T5401] bridge0: port 1(bridge_slave_0) entered blocking state [ 997.997644][ T5401] bridge0: port 1(bridge_slave_0) entered forwarding state [ 998.050071][ T5401] 8021q: adding VLAN 0 to HW filter on device bond0 [ 998.062908][T23612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 998.073419][T23612] bridge0: port 1(bridge_slave_0) entered disabled state [ 998.081789][T23612] bridge0: port 2(bridge_slave_1) entered disabled state [ 998.090818][T23612] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 998.107789][ T5401] 8021q: adding VLAN 0 to HW filter on device team0 [ 998.120345][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 998.130485][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 998.138040][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 998.154353][ T4647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 998.162781][ T4647] bridge0: port 2(bridge_slave_1) entered blocking state [ 998.169933][ T4647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 998.186400][ T4647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 998.195182][ T4647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 998.203728][ T4647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 998.213514][ T4647] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 998.232961][ T4651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 998.242667][ T4651] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 998.257578][ T4647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 998.266304][ T4647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 998.279676][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 998.288503][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 998.304213][ T5401] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 998.322867][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 998.335877][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 998.351927][ T5401] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 998.536039][ T4647] Bluetooth: hci0: command 0x1001 tx timeout [ 998.543341][T24634] Bluetooth: hci0: sending frame failed (-49) 22:18:44 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xffff00000}, {0x80000006, 0x0, 0x0, 0x2}]}, 0x10) r1 = syz_open_dev$swradio(0x0, 0x1, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000100)={0x0, 0x0, 0x0, [], &(0x7f00000000c0)={0x980928, 0x0, [], @p_u8=0x0}}) getresgid(0x0, 0x0, &(0x7f00000003c0)) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000040)=0x32, 0x4) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 22:18:44 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r1) [ 998.695194][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 998.701565][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 998.743885][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 998.749749][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1000.615037][ T4647] Bluetooth: hci0: command 0x1009 tx timeout 22:18:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r2, 0x400455c8, 0x100000001) 22:18:50 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:50 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x80040, 0x118) syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="9c00", @ANYRES16, @ANYBLOB="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"], 0x3}}, 0x80) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000240)=0xe1b0d1fb66878a2) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) lseek(r2, 0x0, 0x1) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) 22:18:50 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x16}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) socket$inet(0x2, 0x4000000000000001, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) socket$inet(0x2, 0x0, 0x0) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) r2 = socket$vsock_dgram(0x28, 0x2, 0x0) dup2(r1, r2) 22:18:50 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) pipe(&(0x7f00000004c0)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 22:18:50 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0xfffffffffffffffe, 0x711000) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000400)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r0}) r2 = add_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000001c0)="a48fb8504ffbd8417bc47fef2aab326abc0b1885c455f29957446b5363598b8546f60a7b14cc81413877b66fa0dac961979b7fcda2ad5e4662a06a8d408c682c688faa518495751919288c8996bee351a76b0349edfd7a2763cf33369e3be456dfd63daed28269ff6f771112816b43ccc0c8335518dca212a651675ce272a62c65530050fc83", 0x86, r1) r3 = getegid() keyctl$chown(0x4, r2, 0xee00, r3) syz_open_dev$sndpcmc(0x0, 0x7, 0x76243) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r4, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r4) [ 1005.291816][ T5434] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1005.349981][ T5434] EXT4-fs (loop4): orphan cleanup on readonly fs [ 1005.371257][ T5434] EXT4-fs error (device loop4): ext4_orphan_get:1252: comm syz-executor.4: bad orphan inode 2 22:18:50 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 1005.434242][ T5434] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:18:50 executing program 2: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f00000000c0)={0x18, 0x8c, &(0x7f00000001c0)="96d0ad590909b48d7f16cbbdd0d1dc1901bc8110fe463186c1c07a556da8fd2b981dbdbfa171dbad790729bf338704b832427b6d9f1eb9f8980f96b0d9a1ca3717ff58dfdfdb95e9eca635518bbb0eafc940cf5cd81cf02ef7c45ffc2a95544fab98e463f3bd0ed5224dd0ae9093315fb6c136c7e837c863341e55056017dd1dc4e7e2ee4b29277dfb151880"}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$TUNGETIFF(r3, 0x800454d2, &(0x7f0000000140)) syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r4, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r5 = semget$private(0x0, 0x2000000010a, 0x0) semctl$GETALL(r5, 0x0, 0xd, &(0x7f0000000000)=""/141) semctl$SEM_STAT(r5, 0x0, 0x12, &(0x7f0000000040)=""/117) close(r4) 22:18:51 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) pipe(&(0x7f00000004c0)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 22:18:51 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:18:51 executing program 2: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x480}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000040)={0x0, 0x0, 0x20}) r3 = syz_open_dev$dri(0x0, 0x0, 0x0) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r6 = dup(r5) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r6}) r7 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r7, 0xc00c642e, &(0x7f00000000c0)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f0000000080)={0x0, 0xc0000, r7}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f00000000c0)={r2, r8, 0x6}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800, 0x101}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r9, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) close(r9) 22:18:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) pipe(&(0x7f00000004c0)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 1005.951601][ T5454] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1006.003369][ T5454] EXT4-fs (loop4): orphan cleanup on readonly fs [ 1006.050361][ T5454] EXT4-fs error (device loop4): ext4_orphan_get:1252: comm syz-executor.4: bad orphan inode 2 [ 1006.111261][ T5454] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1006.275901][ T5471] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1006.312753][ T5471] EXT4-fs (loop1): orphan cleanup on readonly fs [ 1006.331252][ T5471] EXT4-fs error (device loop1): ext4_orphan_get:1252: comm syz-executor.1: bad orphan inode 2 [ 1006.384374][ T5471] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1007.253967][ T4647] Bluetooth: hci0: command 0x1003 tx timeout [ 1007.260872][T24634] Bluetooth: hci0: sending frame failed (-49) [ 1007.757426][ T5484] IPVS: ftp: loaded support on port[0] = 21 [ 1007.843655][ T5484] chnl_net:caif_netlink_parms(): no params data found [ 1007.878656][ T5484] bridge0: port 1(bridge_slave_0) entered blocking state [ 1007.889476][ T5484] bridge0: port 1(bridge_slave_0) entered disabled state [ 1007.897912][ T5484] device bridge_slave_0 entered promiscuous mode [ 1007.906825][ T5484] bridge0: port 2(bridge_slave_1) entered blocking state [ 1007.914128][ T5484] bridge0: port 2(bridge_slave_1) entered disabled state [ 1007.922027][ T5484] device bridge_slave_1 entered promiscuous mode [ 1007.944625][ T5484] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1007.956756][ T5484] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1007.985797][ T5484] team0: Port device team_slave_0 added [ 1007.993237][ T5484] team0: Port device team_slave_1 added [ 1008.038086][ T5484] device hsr_slave_0 entered promiscuous mode [ 1008.084195][ T5484] device hsr_slave_1 entered promiscuous mode [ 1008.123939][ T5484] debugfs: Directory 'hsr0' with parent '/' already present! [ 1008.146967][ T5484] bridge0: port 2(bridge_slave_1) entered blocking state [ 1008.154138][ T5484] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1008.161633][ T5484] bridge0: port 1(bridge_slave_0) entered blocking state [ 1008.168798][ T5484] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1008.218482][ T5484] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1008.231441][ T5104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1008.242627][ T5104] bridge0: port 1(bridge_slave_0) entered disabled state [ 1008.251677][ T5104] bridge0: port 2(bridge_slave_1) entered disabled state [ 1008.261003][ T5104] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1008.276833][ T5484] 8021q: adding VLAN 0 to HW filter on device team0 [ 1008.292572][ T4647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1008.301773][ T4647] bridge0: port 1(bridge_slave_0) entered blocking state [ 1008.309060][ T4647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1008.336787][ T4651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1008.345964][ T4651] bridge0: port 2(bridge_slave_1) entered blocking state [ 1008.353020][ T4651] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1008.361767][ T4651] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1008.371778][ T4651] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1008.387516][ T5484] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1008.398835][ T5484] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1008.411507][T23612] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1008.421421][T23612] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1008.430256][T23612] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1008.440636][T23612] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1008.461147][ T5104] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1008.468735][ T5104] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1008.481208][ T5484] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1008.653889][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1008.659798][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1008.693989][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1008.700065][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1008.705935][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1008.711701][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1009.334634][ T2844] Bluetooth: hci0: command 0x1001 tx timeout [ 1009.340791][T24634] Bluetooth: hci0: sending frame failed (-49) [ 1011.425349][ T4651] Bluetooth: hci0: command 0x1009 tx timeout [ 1012.244952][ T9671] device bridge_slave_1 left promiscuous mode [ 1012.251252][ T9671] bridge0: port 2(bridge_slave_1) entered disabled state [ 1012.316856][ T9671] device bridge_slave_0 left promiscuous mode [ 1012.323070][ T9671] bridge0: port 1(bridge_slave_0) entered disabled state [ 1012.375941][ T9671] device bridge_slave_1 left promiscuous mode [ 1012.382202][ T9671] bridge0: port 2(bridge_slave_1) entered disabled state [ 1012.435178][ T9671] device bridge_slave_0 left promiscuous mode [ 1012.441418][ T9671] bridge0: port 1(bridge_slave_0) entered disabled state [ 1012.495922][ T9671] device bridge_slave_1 left promiscuous mode [ 1012.502148][ T9671] bridge0: port 2(bridge_slave_1) entered disabled state [ 1012.535225][ T9671] device bridge_slave_0 left promiscuous mode [ 1012.541683][ T9671] bridge0: port 1(bridge_slave_0) entered disabled state 22:19:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r2, 0x400455c8, 0x100000001) 22:19:00 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:19:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) pipe(&(0x7f00000004c0)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 22:19:00 executing program 2: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:19:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) pipe(&(0x7f00000004c0)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 22:19:00 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x80040, 0x118) syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="9c00", @ANYRES16, @ANYBLOB="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"], 0x3}}, 0x80) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000240)=0xe1b0d1fb66878a2) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) lseek(r2, 0x0, 0x1) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) [ 1015.619204][ T5508] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock 22:19:01 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:19:01 executing program 2: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 1015.661942][ T5506] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1015.686125][ T5508] EXT4-fs (loop1): orphan cleanup on readonly fs [ 1015.719040][ T5508] EXT4-fs error (device loop1): ext4_orphan_get:1252: comm syz-executor.1: bad orphan inode 2 [ 1015.755612][ T5506] EXT4-fs (loop4): orphan cleanup on readonly fs [ 1015.789265][ T5508] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1015.797140][ T5506] EXT4-fs error (device loop4): ext4_orphan_get:1252: comm syz-executor.4: bad orphan inode 2 [ 1015.866762][ T21] Bluetooth: Error in BCSP hdr checksum [ 1015.873052][ T5506] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 22:19:01 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00') ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) 22:19:01 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) pipe(&(0x7f00000004c0)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 22:19:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) pipe(&(0x7f00000004c0)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 22:19:01 executing program 2: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r1, 0x9204, 0x9c0be) pipe(0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000140)={0xc, {0x3ff, 0x4, 0xcf8, 0x11}, {0x3, 0x2, 0x8, 0x244}, {0x0, 0x4}}) umount2(&(0x7f0000000540)='./file0\x00', 0x4) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000080", @ANYRES16=0x0, @ANYBLOB="020026bd7000000000000d000000080004"], 0x3}, 0x1, 0x0, 0x0, 0x1800}, 0x0) [ 1016.125465][ T1869] Bluetooth: Error in BCSP hdr checksum [ 1016.457739][ T5546] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1016.480887][ T5548] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1016.491598][ T5546] EXT4-fs (loop4): orphan cleanup on readonly fs [ 1016.515848][ T5548] EXT4-fs (loop1): orphan cleanup on readonly fs [ 1016.520424][ T5546] EXT4-fs error (device loop4): ext4_orphan_get:1252: comm syz-executor.4: bad orphan inode 2 [ 1016.538598][ T5548] EXT4-fs error (device loop1): ext4_orphan_get:1252: comm syz-executor.1: bad orphan inode 2 [ 1016.574290][ T5546] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1016.615334][ T5548] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 1017.653995][ T17] Bluetooth: hci0: command 0x1003 tx timeout [ 1017.660233][T24634] Bluetooth: hci0: sending frame failed (-49) [ 1019.734540][ T17] Bluetooth: hci0: command 0x1001 tx timeout [ 1019.741069][T24634] Bluetooth: hci0: sending frame failed (-49) [ 1019.954635][ T9671] device hsr_slave_0 left promiscuous mode [ 1020.024009][ T9671] device hsr_slave_1 left promiscuous mode [ 1020.080807][ T9671] team0 (unregistering): Port device team_slave_1 removed [ 1020.096465][ T9671] team0 (unregistering): Port device team_slave_0 removed [ 1020.110691][ T9671] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1020.171429][ T9671] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1020.292699][ T9671] bond0 (unregistering): Released all slaves [ 1020.484722][ T9671] device hsr_slave_0 left promiscuous mode [ 1020.534109][ T9671] device hsr_slave_1 left promiscuous mode [ 1020.598332][ T9671] team0 (unregistering): Port device team_slave_1 removed [ 1020.611445][ T9671] team0 (unregistering): Port device team_slave_0 removed [ 1020.625270][ T9671] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1020.710586][ T9671] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1020.824906][ T9671] bond0 (unregistering): Released all slaves [ 1021.034795][ T9671] device hsr_slave_0 left promiscuous mode [ 1021.114242][ T9671] device hsr_slave_1 left promiscuous mode [ 1021.198704][ T9671] team0 (unregistering): Port device team_slave_1 removed [ 1021.212519][ T9671] team0 (unregistering): Port device team_slave_0 removed [ 1021.228204][ T9671] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1021.271364][ T9671] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1021.385035][ T9671] bond0 (unregistering): Released all slaves [ 1021.576512][ T5564] IPVS: ftp: loaded support on port[0] = 21 [ 1021.658722][ T5564] chnl_net:caif_netlink_parms(): no params data found [ 1021.695174][ T5564] bridge0: port 1(bridge_slave_0) entered blocking state [ 1021.702533][ T5564] bridge0: port 1(bridge_slave_0) entered disabled state [ 1021.711003][ T5564] device bridge_slave_0 entered promiscuous mode [ 1021.719442][ T5564] bridge0: port 2(bridge_slave_1) entered blocking state [ 1021.727766][ T5564] bridge0: port 2(bridge_slave_1) entered disabled state [ 1021.739444][ T5564] device bridge_slave_1 entered promiscuous mode [ 1021.760867][ T5564] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1021.773849][ T5564] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1021.795558][ T5564] team0: Port device team_slave_0 added [ 1021.804438][ T5564] team0: Port device team_slave_1 added [ 1021.814066][ T17] Bluetooth: hci0: command 0x1009 tx timeout [ 1021.866281][ T5564] device hsr_slave_0 entered promiscuous mode [ 1021.924272][ T5564] device hsr_slave_1 entered promiscuous mode [ 1021.984039][ T5564] debugfs: Directory 'hsr0' with parent '/' already present! [ 1022.007168][ T5564] bridge0: port 2(bridge_slave_1) entered blocking state [ 1022.014572][ T5564] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1022.022088][ T5564] bridge0: port 1(bridge_slave_0) entered blocking state [ 1022.029885][ T5564] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1022.079828][ T5564] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1022.096487][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1022.105933][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 1022.115740][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 1022.135343][ T5564] 8021q: adding VLAN 0 to HW filter on device team0 [ 1022.149811][ T4651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1022.158382][ T4651] bridge0: port 1(bridge_slave_0) entered blocking state [ 1022.165837][ T4651] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1022.184543][ T5104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1022.193273][ T5104] bridge0: port 2(bridge_slave_1) entered blocking state [ 1022.200481][ T5104] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1022.212631][ T4651] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1022.222910][ T4651] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1022.243476][ T5564] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1022.256537][ T5564] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1022.269724][ T5104] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1022.279187][ T5104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1022.295205][ T5104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1022.303713][ T5104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1022.324967][ T5104] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1022.332632][ T5104] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1022.348903][ T5564] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1022.623964][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1022.629866][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1026.147363][ T5510] ================================================================== [ 1026.155751][ T5510] BUG: KASAN: use-after-free in kfree_skb+0x38/0x3c0 [ 1026.162593][ T5510] Read of size 4 at addr ffff8880927c9914 by task syz-executor.0/5510 [ 1026.170766][ T5510] [ 1026.173100][ T5510] CPU: 0 PID: 5510 Comm: syz-executor.0 Not tainted 5.4.0-rc8 #0 [ 1026.180797][ T5510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1026.190847][ T5510] Call Trace: [ 1026.194135][ T5510] dump_stack+0x197/0x210 [ 1026.198445][ T5510] ? kfree_skb+0x38/0x3c0 [ 1026.202757][ T5510] print_address_description.constprop.0.cold+0xd4/0x30b [ 1026.211253][ T5510] ? kfree_skb+0x38/0x3c0 [ 1026.215563][ T5510] ? kfree_skb+0x38/0x3c0 [ 1026.219884][ T5510] __kasan_report.cold+0x1b/0x41 [ 1026.224831][ T5510] ? kfree_skb+0x38/0x3c0 [ 1026.229161][ T5510] kasan_report+0x12/0x20 [ 1026.233479][ T5510] check_memory_region+0x134/0x1a0 [ 1026.238572][ T5510] __kasan_check_read+0x11/0x20 [ 1026.243402][ T5510] kfree_skb+0x38/0x3c0 [ 1026.247549][ T5510] bcsp_close+0xc7/0x130 [ 1026.251782][ T5510] hci_uart_tty_close+0x21e/0x280 [ 1026.256796][ T5510] ? hci_uart_close+0x50/0x50 [ 1026.261524][ T5510] tty_ldisc_close.isra.0+0x119/0x1a0 [ 1026.266979][ T5510] tty_ldisc_kill+0x9c/0x160 [ 1026.271562][ T5510] tty_ldisc_release+0xe9/0x2b0 [ 1026.276569][ T5510] tty_release_struct+0x1b/0x50 [ 1026.281401][ T5510] tty_release+0xbcb/0xe90 [ 1026.285849][ T5510] __fput+0x2ff/0x890 [ 1026.289841][ T5510] ? put_tty_driver+0x20/0x20 [ 1026.294523][ T5510] ____fput+0x16/0x20 [ 1026.298499][ T5510] task_work_run+0x145/0x1c0 [ 1026.303069][ T5510] exit_to_usermode_loop+0x316/0x380 [ 1026.309041][ T5510] do_syscall_64+0x65f/0x760 [ 1026.313648][ T5510] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1026.319530][ T5510] RIP: 0033:0x4141d1 [ 1026.323403][ T5510] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1026.343008][ T5510] RSP: 002b:00007fffb9c688b0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1026.351588][ T5510] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 00000000004141d1 [ 1026.359547][ T5510] RDX: 0000000000000000 RSI: ffffffff874cd13a RDI: 0000000000000004 [ 1026.367510][ T5510] RBP: 0000000000000001 R08: ffffffff8134daf4 R09: 000000005fe9a91f [ 1026.375482][ T5510] R10: 00007fffb9c68990 R11: 0000000000000293 R12: 000000000075c9a0 [ 1026.383446][ T5510] R13: 000000000075c9a0 R14: 0000000000760318 R15: 000000000075bfd4 [ 1026.391417][ T5510] ? __phys_addr+0x44/0x120 [ 1026.395904][ T5510] ? snprintf+0x8a/0xf0 [ 1026.400034][ T5510] [ 1026.402349][ T5510] Allocated by task 1869: [ 1026.406663][ T5510] save_stack+0x23/0x90 [ 1026.410811][ T5510] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1026.416445][ T5510] kasan_slab_alloc+0xf/0x20 [ 1026.421021][ T5510] kmem_cache_alloc_node+0x138/0x740 [ 1026.426308][ T5510] __alloc_skb+0xd5/0x5e0 [ 1026.430635][ T5510] bcsp_recv+0x8c1/0x13a0 [ 1026.434965][ T5510] hci_uart_tty_receive+0x279/0x6e0 [ 1026.440142][ T5510] tty_ldisc_receive_buf+0x15f/0x1c0 [ 1026.445421][ T5510] tty_port_default_receive_buf+0x7d/0xb0 [ 1026.451130][ T5510] flush_to_ldisc+0x222/0x390 [ 1026.455809][ T5510] process_one_work+0x9af/0x1740 [ 1026.460744][ T5510] worker_thread+0x98/0xe40 [ 1026.465251][ T5510] kthread+0x361/0x430 [ 1026.469318][ T5510] ret_from_fork+0x24/0x30 [ 1026.473731][ T5510] [ 1026.476050][ T5510] Freed by task 1869: [ 1026.480022][ T5510] save_stack+0x23/0x90 [ 1026.484159][ T5510] __kasan_slab_free+0x102/0x150 [ 1026.489111][ T5510] kasan_slab_free+0xe/0x10 [ 1026.493601][ T5510] kmem_cache_free+0x86/0x320 [ 1026.498269][ T5510] kfree_skbmem+0xc5/0x150 [ 1026.502662][ T5510] kfree_skb+0x109/0x3c0 [ 1026.506904][ T5510] bcsp_recv+0x2d8/0x13a0 [ 1026.511219][ T5510] hci_uart_tty_receive+0x279/0x6e0 [ 1026.516395][ T5510] tty_ldisc_receive_buf+0x15f/0x1c0 [ 1026.521657][ T5510] tty_port_default_receive_buf+0x7d/0xb0 [ 1026.527387][ T5510] flush_to_ldisc+0x222/0x390 [ 1026.532066][ T5510] process_one_work+0x9af/0x1740 [ 1026.536986][ T5510] worker_thread+0x98/0xe40 [ 1026.541475][ T5510] kthread+0x361/0x430 [ 1026.545536][ T5510] ret_from_fork+0x24/0x30 [ 1026.549937][ T5510] [ 1026.552274][ T5510] The buggy address belongs to the object at ffff8880927c9840 [ 1026.552274][ T5510] which belongs to the cache skbuff_head_cache of size 224 [ 1026.566839][ T5510] The buggy address is located 212 bytes inside of [ 1026.566839][ T5510] 224-byte region [ffff8880927c9840, ffff8880927c9920) [ 1026.580112][ T5510] The buggy address belongs to the page: [ 1026.585748][ T5510] page:ffffea000249f240 refcount:1 mapcount:0 mapping:ffff8880a99e38c0 index:0x0 [ 1026.594876][ T5510] raw: 01fffc0000000200 ffffea0002a4bf48 ffffea00025beb08 ffff8880a99e38c0 [ 1026.603498][ T5510] raw: 0000000000000000 ffff8880927c90c0 000000010000000c 0000000000000000 [ 1026.612067][ T5510] page dumped because: kasan: bad access detected [ 1026.618461][ T5510] [ 1026.620768][ T5510] Memory state around the buggy address: [ 1026.626559][ T5510] ffff8880927c9800: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 1026.634616][ T5510] ffff8880927c9880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1026.642662][ T5510] >ffff8880927c9900: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 1026.650706][ T5510] ^ [ 1026.655300][ T5510] ffff8880927c9980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1026.663338][ T5510] ffff8880927c9a00: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 1026.671375][ T5510] ================================================================== [ 1026.679412][ T5510] Disabling lock debugging due to kernel taint [ 1026.686145][ T5510] Kernel panic - not syncing: panic_on_warn set ... [ 1026.692754][ T5510] CPU: 0 PID: 5510 Comm: syz-executor.0 Tainted: G B 5.4.0-rc8 #0 [ 1026.701855][ T5510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1026.711904][ T5510] Call Trace: [ 1026.715206][ T5510] dump_stack+0x197/0x210 [ 1026.719647][ T5510] panic+0x2e3/0x75c [ 1026.723539][ T5510] ? add_taint.cold+0x16/0x16 [ 1026.728206][ T5510] ? kfree_skb+0x38/0x3c0 [ 1026.732520][ T5510] ? preempt_schedule+0x4b/0x60 [ 1026.737353][ T5510] ? ___preempt_schedule+0x16/0x20 [ 1026.742440][ T5510] ? trace_hardirqs_on+0x5e/0x240 [ 1026.747446][ T5510] ? kfree_skb+0x38/0x3c0 [ 1026.751749][ T5510] end_report+0x47/0x4f [ 1026.755883][ T5510] ? kfree_skb+0x38/0x3c0 [ 1026.760296][ T5510] __kasan_report.cold+0xe/0x41 [ 1026.765174][ T5510] ? kfree_skb+0x38/0x3c0 [ 1026.769499][ T5510] kasan_report+0x12/0x20 [ 1026.773829][ T5510] check_memory_region+0x134/0x1a0 [ 1026.779123][ T5510] __kasan_check_read+0x11/0x20 [ 1026.783971][ T5510] kfree_skb+0x38/0x3c0 [ 1026.788157][ T5510] bcsp_close+0xc7/0x130 [ 1026.792379][ T5510] hci_uart_tty_close+0x21e/0x280 [ 1026.797380][ T5510] ? hci_uart_close+0x50/0x50 [ 1026.802041][ T5510] tty_ldisc_close.isra.0+0x119/0x1a0 [ 1026.807407][ T5510] tty_ldisc_kill+0x9c/0x160 [ 1026.811973][ T5510] tty_ldisc_release+0xe9/0x2b0 [ 1026.816807][ T5510] tty_release_struct+0x1b/0x50 [ 1026.821629][ T5510] tty_release+0xbcb/0xe90 [ 1026.826041][ T5510] __fput+0x2ff/0x890 [ 1026.830027][ T5510] ? put_tty_driver+0x20/0x20 [ 1026.834683][ T5510] ____fput+0x16/0x20 [ 1026.838641][ T5510] task_work_run+0x145/0x1c0 [ 1026.843825][ T5510] exit_to_usermode_loop+0x316/0x380 [ 1026.849110][ T5510] do_syscall_64+0x65f/0x760 [ 1026.853690][ T5510] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1026.859556][ T5510] RIP: 0033:0x4141d1 [ 1026.863428][ T5510] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1026.883021][ T5510] RSP: 002b:00007fffb9c688b0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1026.891420][ T5510] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 00000000004141d1 [ 1026.899375][ T5510] RDX: 0000000000000000 RSI: ffffffff874cd13a RDI: 0000000000000004 [ 1026.907359][ T5510] RBP: 0000000000000001 R08: ffffffff8134daf4 R09: 000000005fe9a91f [ 1026.915403][ T5510] R10: 00007fffb9c68990 R11: 0000000000000293 R12: 000000000075c9a0 [ 1026.923364][ T5510] R13: 000000000075c9a0 R14: 0000000000760318 R15: 000000000075bfd4 [ 1026.931420][ T5510] ? __phys_addr+0x44/0x120 [ 1026.936039][ T5510] ? snprintf+0x8a/0xf0 [ 1026.941585][ T5510] Kernel Offset: disabled [ 1026.945956][ T5510] Rebooting in 86400 seconds..